header bg

Question:

To implement network security policies for an environment, which devices are used?

A Firewall
Explaination