Which of the following is a common method for blocking malicious traffic during incident containment?
Antivirus software
Intrusion detection systems
Firewalls
Endpoint security agents

Incident Response Exercises are loading ...