Answer:
It’s a system that monitors network traffic to prevent security threats or policy violations.
Explanation:
This system is designed to analyze the attack data and act accordingly by stopping it while the attack is brewing and before it is successful. This occurs immediately creating a series of blockages in the corporate firewall preventing the attack to be made.