Which of the following systems helps to detect the “abuse of privileges” attack that does not
actually involve exploiting any security vulnerability?
A.
Signature-Based ID system
B.
Network-Based ID system
C.
Statistical Anomaly-Based ID system
D.
Host-Based ID system
Explanation: