Which mechanism complements an IDS?

A.
Activating the built in VPN capabilities
B.
Configuring built in alerts
C.
All of the above
D.
None of the above
Explanation:
A network security engineer or other security personal must configure the IDS to detect alerts for
specified security events, so the IDS will log the threat event. An IDS can either be a Network or Host
based. Both have default settings and allow the administrator to configure triggers for alerts.