Final answer:
The optimal placement of IPS/IDS devices to secure an enterprise infrastructure is at the network perimeter. This allows for the monitoring of all inbound and outbound traffic, ensuring threats are detected and prevented before they can penetrate deeper into the network.
Step-by-step explanation:
The most effective placement of Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) devices for securing an enterprise infrastructure would be option D: Place the IPS/IDS devices at the network perimeter to monitor inbound and outbound traffic. This positioning ensures that all traffic entering and leaving the network is analyzed, allowing for the identification and prevention of potential threats before they reach the internal network. By placing IPS/IDS devices just outside the firewall, the organization can keep an eye on all traffic and can better secure sensitive data in different security zones.
Option A, placing the devices near a load balancer, would only monitor traffic distribution and may not cover all security zones effectively. Option B would only monitor internal network activities after potential threats have breached the perimeter defenses. Option C, at each end of a VPN tunnel, is good for monitoring remote access but leaves other entry points unprotected. Hence, the comprehensive coverage provided by option D is most suitable in an organization concerned about its attack surface and network connectivity.