Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Trusted and untrusted networks
Type of authentication
Storage encryption
Log retention
Submit