you have been tasked with deploying a security solution that will monitor activity related to a specific application server. the solution must be able to detect suspicious activity and take steps to prevent the activity from continuing. what should you deploy?