Match the tool with its description:
Vulnerability Scanning Tools ↔️ Detect software flaws
Firewalls ↔️ Control network traffic
Intrusion Detection Systems ↔️ Monitor malicious activity
Encryption ↔️ Protect data in transit
Access Controls ↔️ Limit user privileges