Which of the following systems monitors the operating system detecting inappropriate activity,
writing to log files, and triggering alarms?
A.
Behavior-based ID system
B.
Network-based ID system
C.
Signature-Based ID system
D.
Host-based ID system
Explanation: