An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if: 
A、IDS sensors are placed outside of the firewall. 
B、a behavior-based IDS is causing many false alarms. 
C、a signature-based IDS is weak against new types of attacks. 
D、the IDS is used to detect encrypted traffic.