briefly describe how it is used to protect a network from attack. Include why the service will be used for network security as relates to your selected scenario or why it is not applicable in this circumstance.