Which of the following best describes the role of sensors within an Intrusion Detection System (IDS)?
Analyzing network traffic to detect patterns that might indicate a security threat
Optimizing network traffic flow to ensure high availability and performance
Blocking traffic that originates from untrusted sources to prevent network intrusions
Logging all inbound and outbound traffic without performing analysis for potential threats