Where would an organization typically place an endpoint security solution?
A. Web server and individual devices
B. Intrusion Detection System (IDS) and web server
C. Central server and individual devices
D. Intrusion Detection System (IDS) and central sever
A. Web server and individual devices
B. Intrusion Detection System (IDS) and web server
C. Central server and individual devices
D. Intrusion Detection System (IDS) and central sever