header bg

Question:

Which devices are used in an environment to apply network security policies?

A Firewall
Explaination