A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?
A. Behavior based IPS
B. Signature based IDS
C. Antivirus software
D. Access Control Lists