Determining a network scenario is fully secure.

 

 

 

 

 

Determine whether a network scenario is fully secure.
Requirements:
Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.

Answer the following question(s):

1. If your network has both a firewall and an IDS deployed, would you consider it to be fully secure? Why or why not?
Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.

Our customer support team is here to answer your questions. Ask us anything!