Which of the following systems monitors the operating system detecting inappropriate activity,
writing to log files, and triggering alarms?
A.
Signature-Based ID system
B.
Host-based ID system
C.
Network-based ID system
D.
Behavior-based ID system
Explanation: