When protecting an organization’s IT systems, which of the following is normally the next line of
defense after the network firewall has been compromised?
Intrusion detection system (IDS)
Virtual local area network (VLAN) configuration
An intrusion detection system (IDS) would be the next line of defense after the firewall. It would
detect anomalies in the network/server activity and try to detect the perpetrator. Antivirus programs,
personal firewalls and VI_AN configurations would be later in the line of defense.