Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honeypot
C. DMZ
D. Proxy server
Answer: B. Honeypot
Computer Science & Information Technology
You might also like to view...
The ________ feature allows words within a paragraph wrap to the next line when text is inserted or typed
Fill in the blank(s) with correct word
Computer Science & Information Technology
The desktop is the command center for Windows 8.1.1
Indicate whether the statement is true or false
Computer Science & Information Technology