Which of the following could be implemented?

An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?

An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?

A.
HIDS

B.
A VLAN

C.
A network router

D.
An access list



Leave a Reply 0

Your email address will not be published. Required fields are marked *