Refer to the following systems, which can discover and report attempts of unauthorized access to the network?
Which type of software will close a port or discard certain types of packets to handle an attack (including identification and reaction)?