A system administrator is implementing an IDS on the database server to see who is trying to access the
server. The administrator relies on the software provider for what to detect. Which of
the following would MOST likely be installed?

A.
Behavior based IDS
B.
Network based IDS
C.
Signature based IDS
D.
Honeypot