Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?
A. host-based IDS
B. firewall-based IDS
C. bastion-based IDS
D. server-based IDS
A. host-based IDS
B. firewall-based IDS
C. bastion-based IDS
D. server-based IDS