Answer:
Option b (NIDS) is the correct choice.
Step-by-step explanation:
- NIDS helps to detect suspicious internet activity. Throughout order to determine all congestion, along with all network packets, unfaithful user information was indeed probably recommended.
- They were indeed technologies that are already constructively divided up in less than service providers that ineffectively investigate traffic through the systems on something they have been located.
All those other available options aren't closely linked to the scenario in question. Therefore this obvious response is the correct one.