Your company has a strict requirement for monitoring network traffic without introducing any additional latency or potential points of failure within the data path. Which type of security device deployment would best suit the company's needs?
Use a network tap to inject custom packets for traffic shaping and policy enforcement.
Install a Layer 7 firewall to actively inspect all incoming and outgoing packets.
Deploy a passive intrusion detection system that monitors a mirrored copy of the network traffic.
Implement an active intrusion prevention system that inspects and potentially alters network traffic.