What type of firewall would you use to protect your organizations perimeter?
Which type of firewall is better suited to protect against spoof attacks?
How can you reduce false positives and false negatives when it comes to your IDS or IPS device?
What is difference between a full client VPN access and clientless VPN access?
Please provide at least 2-3 references.