Which of the following is the most effective option for detecting a site attack by someone who
wants to modify your customer database?
A.
Using an intrusion detection system
B.
Limiting the open ports on the system
C.
Using antivirus software
D.
Implementing a firewall