A system administrator is implementing an IDS on the database server to see who is trying to access
the server. The administrator relies on the software provider for what to detect. Which of the
following would MOST likely be installed?
A.
Behavior based IDS
B.
Network based IDS
C.
Signature based IDS
D.
Honeypot