Which of the following strategies include prevention,detection of threats?
(a) An authentication server may be placed outside users and the portion of the system that provides services
(b) Network monitors may be installed for the inspection and logging of network events
(c) The system may be placed behind a communications”firewall”
(d) All of the mentioned
The question was asked in examination.
The doubt is from System Quality Attributes Discernable At Runtime in chapter Architectural Patterns and Styles of Software Architecture