A. It reverse engineers and documents the attack
B. It looks subjectively at network traffic for abnormal flows of behavior
C. It creates a signature and updates the network security policies
D. It actively monitors all vulnerable areas of the network