Which of the following is a technology used to prevent unauthorized access to network resources, by examining incoming and outgoing network traffic and deciding to allow or block specific traffic based on a defined set of security rules?
Virtual Private Network
Antivirus Software
Intrusion Detection System
Firewall
Protocol Analyzer
Security Information and Event Management system