Which is an example of legitimate software that Intrusion Protection Systems (IPS) may detect as a threat?
A. Running a P2P software on a network
B. Running a FTP client on a network
C. Running a ley logger on a network
D. Running a vulnerability scanner on a network