Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?
A. Network firewall
B. Software firewall
C. NIDS
D. HIPS
Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?
A. Network firewall
B. Software firewall
C. NIDS
D. HIPS