A company is deploying a network-based intrusion prevention system (IPS) to enhance security across its network. The network administrator has to ensure that the IPS is placed correctly to monitor all traffic that may contain malicious activity while having minimal impact on network performance. Where should the IPS be installed in the network topology?
Inline, behind the firewall, monitoring traffic entering and leaving the internal network
Within the internal network, behind the core switch to monitor lateral movement
Within the demilitarized zone (DMZ), to exclusively monitor and protect servers accessible from the internet
Before the network switch, filtering traffic coming from access-layer switches
Outside the firewall, monitoring all incoming Internet traffic before it reaches the firewall