After completing a security gap analysis, a corporation decides to install a packet monitoring
system to sniff packets passing through the organization’s DMZ. Which system achieves this?
A.
Host-based Intrusion Detection System
B.
Network-based Intrusion Detection System
C.
Behavior-based Intrusion Detection System
D.
Knowledge-based Intrusion Detection System