Which of the following statements is true about a Trojan engine?
A. It limits the system resource usage.
B. It specifies the signatures that keep a watch for a host or a network sending multiple packets to a single host or a single network.
C. It specifies events that occur in a related manner within a sliding time interval.
D. It analyzes the nonstandard protocols, such as TFN2K and BO2K.