A. by securely deploying new applications with appropriate performance levels
B. by providing security that is based on a multilayer,system-level approach
C. by looking subjectively at network traffic for abnormal flows
D. by requiring a host-based hardware application