Right option is (d) They scan network traffic or packets to identify matches with attack-definition files
The explanation is: They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators.