Watch this video on YouTube
Which one of the following statements about the advantages and disadvantages of network-based Intrusion detection systems is true?