The content of intrusion detection covers authorized and unauthorized intrusions. Which of the following is not in the scope of intrusion detection?
A . Pretending to be another user
B . Administrator mistakenly delete configuration
C . Planting worms and Trojans
D . Leaking data information
Answer: B