CISA Certified Information Systems Auditor – Question1613

When protecting an organization's IT systems, which of the following is normally the next line of defense after the network firewall has been compromised?

A.
Personal firewall
B. Antivirus programs
C. Intrusion detection system (IDS)
D. Virtual local area network (VLAN) configuration

Correct Answer: C

Explanation:

Explanation:
An intrusion detection system (IDS) would be the next line of defense after the firewall. It would detect anomalies in the network/server activity and try to detect the perpetrator. Antivirus programs, personal firewalls and VIAN configurations would be later in the line of defense.