This question refers to the following diagram.
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:
A、firewall and the organization's network.
B、Internet and the firewall.
C、Internet and the web server.
D、web server and the firewall.