Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?
Which of the following software security devices can be implemented on individual servers in order to solely identify abnormal behavior?