Which of the following is a vulnerable system designed to detect and log unauthorized access?

A. SIEM
B. Honeypot
C. DMZ
D. Proxy server

Answer: B. Honeypot

Computer Science & Information Technology

You might also like to view...

The ________ feature allows words within a paragraph wrap to the next line when text is inserted or typed

Fill in the blank(s) with correct word

Computer Science & Information Technology

The desktop is the command center for Windows 8.1.1

Indicate whether the statement is true or false

Computer Science & Information Technology