ccsp video for which of the following technologies is used to monitor network traffic and block any potential threats or attacks that match defined signatures
Which of the following technologies is used to monitor network traffic and block any potential threats or attacks that match defined signatures and policies?