An IDS detects an attack using which of the following?

A.
an event-based ID or a statistical anomaly-based ID
B.
a discrete anomaly-based ID or a signature-based ID
C.
a signature-based ID or a statistical anomaly-based ID
D.
a signature-based ID or an event-based ID