.What can be used to gather evidence of network attacks?

A.
Access control lists (ACL)
B.
Intrusion-detection systems (IDS)
C.
Syslog reporting
D.
Antivirus programs
Explanation:
Intrusion-detection systems (IDS) are used to gather evidence of network attacks.