Examine the roles necessary to properly prepare for a penetration test involving IPS or IDS technologies including the use of supporting example

Examine the roles necessary to properly prepare for a penetration test involving IPS or IDS technologies including the use of supporting example