CYBERLAWS & ETHICAL HACKING


Determine whether a network scenario is fully secure.
Requirements:

Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.

Answer the following question(s):

  1. 1. If your network has both a firewall and an IDS deployed, would you consider it to be fully secure? Why or why not?

Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.