To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:
Which of the following cryptographic systems is MOST appropriate for bulk data encryption and small devices such as smart cards?
which of the following would make wireless local area networks more secure against unauthorized access?