A. An IPS should be deployed if the security policy does not support the denial of traffic.
	B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
	C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
	D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.