What device is placed outside the boundary protection mechanism to monitor all attempted attacks?
a. Intrusion detection system (IDS).
b. De-militarized zone (DMZ).
c. Vulnerability scanner.
d. Firewall.
Answer: A
Quiz, Objective, Multiple Choice Question (MCQ), Test Bank Solution and Short Answers.