The majority of commercial intrusion detection systems are:

A.
Identity-based
B.
Network-based
C.
Host-based
D.
Signature-based
Explanation:
The majority of commercial intrusion detection systems are network-based. These IDSs detect
attacks by capturing and analyzing network packets. Listening on a network segment or switch, one
network-based IDS can monitor the network traffic affecting multiple hosts that are connected to
the network segment, thereby protecting those hosts.