What are the two primary purposes of the intrusion analysis process? (Choose two.)
A. blocking attacks
B. identifying attacks
C. filtering out unnecessary, unwanted, or inaccurate event data
D. troubleshooting IPS device issues
E. collecting information about all the network traffic