Which of the following could be detected by a network intrusion detection system (IDS)?
A. Undocumented open ports
B. Unauthorized file change
C. Internally generated attacks
D. Emailed virus attachments
A. Undocumented open ports
B. Unauthorized file change
C. Internally generated attacks
D. Emailed virus attachments