Which of the following devices can be used to block a list of known malicious IP addresses at the
furthest edge of a corporate network?
A.
Network firewall
B.
Software firewall
C.
NIDS
D.
HIPS
Explanation:
Which of the following devices can be used to block a list of known malicious IP addresses at the
furthest edge of a corporate network?
Which of the following devices can be used to block a list of known malicious IP addresses at the
furthest edge of a corporate network?
A.
Network firewall
B.
Software firewall
C.
NIDS
D.
HIPS
Explanation: