8. An intrusion prevention system can either wait until it has all the information it needs or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?