Suspicious traffic without a specific signature was detected. Under further investigation, it
was determined that these were false indicators. Which of the following security devices
needs to be configured to disable future false alarms?

A.
Signature based IPS
B.
Signature based IDS
C.
Application based IPS
D.
Anomaly based IDS