Which of the following tools is used to monitor network traffic for suspicious patterns and activities, providing real-time alerts and helping to prevent security breaches?
Firewall
Virtual Private Network (VPN)
Cloud Access Security Broker (CASB)
Intrusion Detection System (IDS)

Cloud Security Exercises are loading ...