A cloud administrator is tasked with selecting a security tool for monitoring network traffic and protecting against malware in a cloud environment. However, the administrator must ensure that the deployment of this tool has a minimal impact on system performance. Which of the following would be the BEST option to use?
Network-based intrusion detection system (IDS)
Agent-based intrusion detection system (IDS)
Vulnerability scanner
Port scanner