Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?
Which of the following protocols would be MOST likely found to be running on a device in a SOHO environment?