A security engineer needs to recommend a solution to defend against malicious actors misusing protocols and being allowed through network defenses. Which of the following will the engineer most likely recommend?
A. A content filter
B. A WAF
C. A next-generation firewall
D. An IDS
A. A content filter
B. A WAF
C. A next-generation firewall
D. An IDS