Which of the following anti-malware solutions should be implemented to deter attackers from loading custom files onto a distributed target platform?
A.
Cloud-based anti-malware
B.
Host-based anti-malware
C.
Network-based anti-malware
D.
Signature-based anti-malware
Explanation:
https://en.wikipedia.org/wiki/Intrusion_detection_system