An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that:
A.
it is being caused by the presence of a rogue access point.
B.
it is the beginning of a DDoS attack.
C.
the IDS has been compromised.
D.
the internal DNS tables have been poisoned.