Intrusion detection systems (IDSs) can:
A. substitute for a firewall.
B. compensate for weak authentication mechanisms.
C. conduct investigations of attacks from within the network.
D. provide information to enhance the security infrastructure.
A. substitute for a firewall.
B. compensate for weak authentication mechanisms.
C. conduct investigations of attacks from within the network.
D. provide information to enhance the security infrastructure.