An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?
A. Intrusion prevention system
B. Proxy server
C. Jump server
D. Security zones
A. Intrusion prevention system
B. Proxy server
C. Jump server
D. Security zones