Determine whether a network scenario is fully secure.Requirements:Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.Answer the following question(s): 1. If your network has both a firewall and an IDS...