Which of the following systems or tools can recognize that a credit card transaction is more likely
to have resulted from a stolen credit card than from the holder of the credit card?

A.
Intrusion detection systems
B.
Data mining techniques
C.
Firewalls
D.
Packet filtering routers
Explanation:
Data mining is a technique used to detect trends or patterns of transactions or datA. If the historical
pattern of charges against a credit card account is changed, then it is a flag that the transaction
may have resulted from a fraudulent use of the card.