An administrator is looking to implement a security device which will be able to not only detect
network intrusions at the organization level, but help defend against them as well. Which of the
following is being described here?
A.
NIDS
B.
NIPS
C.
HIPS
D.
HIDS