单选题
Most computer systems are ______ to two different groups of attacks: insider attacks and outsider attacks. A system that is known to be ______ to an outsider attack by preventing ______ from outside can still be vulnerable to the insider attacks accomplished by abusive usage of ______ users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually ______ by tools referred to as Intrusion Detection Systems.
单选题
A. vulnerable B. week C. helpless D. sensitively