A network administrator has been asked to design a solution to improve a company’s security posture.
The administrator is given the following, requirements?
• The solution must be inline in the network
• The solution must be able to block known malicious traffic
• The solution must be able to stop network-based attacks
Which of the following should the network administrator implement to BEST meet these requirements?
A . HIDS
B . NIDS
C . HIPS
D . NIPS
Answer: D