An IT administrator has been tasked by the Chief Executive Officer with implementing security
using a single device based on the following requirements:
1. Selective sandboxing of suspicious code to determine malicious intent.
2. VoIP handling for SIP and H.323 connections.
3. Block potentially unwanted applications.
Which of the following devices would BEST meet all of these requirements?
A.
UTM
B.
HIDS
C.
NIDS
D.
WAF
E.
HSM