An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:
A、IDS sensors are placed outside of the firewall.
B、a behavior-based IDS is causing many false alarms.
C、a signature-based IDS is weak against new types of attacks.
D、the IDS is used to detect encrypted traffic.