Answer:
IPS
Step-by-step explanation:
Intrusion Prevention System can track suspicious activities such as policy violation and actively take preventive measures to prevent and minimize the intrusion impact. It is referred to the network protection technology that analyses the flows of network traffic to identify and mitigate exploits of vulnerability. Vulnerabilities generally come to a specific service in the form of malicious inputs, which attackers use to disrupt and seize the power of a particular application. As per the question, Vicky needs an IPS to counter the hacking attempts.