The two most common implementations of Intrusion Detection are which of the following?

A.
They commonly reside on a discrete network segment and monitor the traffic on that network
segment
B.
They commonly will not reside on a discrete network segment and monitor the traffic on that
network segment
C.
They commonly reside on a discrete network segment but do not monitor the traffic on that
network segment
D.
They commonly do not reside on a discrete network segment and monitor the traffic on that
network segment