antje has been asked to review the cybersecurity infrastructure deployed to ensure that they are looking at every layer in their defense in-depth strategy. he finds that there is adequate protection at the perimeter of each zone but is concerned that zero-day network-based attacks may still make it into the network segment. which of the following should he recommend implementing?