Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
Which of the following security concepts are used for data classification and labeling to protect data?