Which of the following is most likely to be useful in detecting intrusions?
A. Access control lists
B. Security labels
C. Audit trails
D. Information security policies
A. Access control lists
B. Security labels
C. Audit trails
D. Information security policies