_____ scan critical system files, directories, and services to ensure they have note been changed without proper authorization a) Network and host intrusion detection systems b) System integrity verification tools c) Intrusion prevention systems
d) Log analysis tools