What device is placed outside the boundary protection mechanism to monitor all attempted attacks?

What device is placed outside the boundary protection mechanism to monitor all attempted attacks?



a. Intrusion detection system (IDS).
b. De-militarized zone (DMZ).
c. Vulnerability scanner.
d. Firewall.





Answer: A