Which of the following reviews system and event logs to detect attacks on the host and determine if the attack
was successful?

A.
host-based IDS
B.
firewall-based IDS
C.
bastion-based IDS
D.
server-based IDS
Explanation:
A host-based intrusion detection system (HIDS) monitors and analyzes the internals of a computing system.
This would include system and event logs.
Incorrect Answers:
A, B, C: These are not valid IDS types.https://en.wikipedia.org/wiki/Intrusion_detection_system
https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system