This question refers to the following diagram. 
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the: 
A、firewall and the organization's network. 
B、Internet and the firewall. 
C、Internet and the web server. 
D、web server and the firewall. 
							
