Which of the following strategies include prevention,detection of threats
- An authentication server may be placed outside users and the portion of the system that provides services
- Network monitors may be installed for the inspection and logging of network events
- The system may be placed behind a communications”firewall”
- All of the mentioned