A network administrator wants to be able to block all already known malicious activity. Which of the following would allow the network administrator to perform this activity?
A.
Behavioral Based IDS
B.
Signature Based IDS
C.
Behavioral Based IPS
D.
Signature Based IPS