signatures. The security engineer wants to implement a tool with multiple components including the ability to
track, analyze, and monitor devices without reliance on definitions alone. Which of the following solutions best
fits this use case?
A. EDR
B. DLP
C. NGFW
D. HIPS