The majority of commercial intrusion detection systems are:

A.
Identity-based
B.
Network-based
C.
Host-based
D.
Signature-based
Explanation:
The majority of commercial intrusion detection systems are network-based. These IDSs
detect attacks by capturing and analyzing network packets. Listening on a network
segment or switch, one network-based IDS can monitor the network traffic affecting
multiple hosts that are connected to the network segment, thereby protecting those
hosts.