Which of the following is a technology used to prevent unauthorized access to network resources, by examining incoming and outgoing network traffic and deciding to allow or block specific traffic based on a defined set of security rules?
Firewall
Intrusion Detection System
Security Information and Event Management system
Antivirus Software
Virtual Private Network
Protocol Analyzer