Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?