A honeypot might be used in a network for which of the following reasons

a. Lure or entrap hackers so that law enforcement can be informed
b. Gather information on new attacks and threats
c. Distract hackers from attacking legitimate network resources
d. Protect the DMZ from internal attacks

Ans:
a. Lure or entrap hackers so that law enforcement can be informed
b. Gather information on new attacks and threats
c. Distract hackers from attacking legitimate network resources

Computer Science & Information Technology

You might also like to view...

Which of the following is a mode of operation that includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates?

A. WPA3-Personal B. WPA2-Personal C. WPA3-Enterprise D. WPA2-Enterprise

Computer Science & Information Technology

Which of the following is TRUE about a wireless network?

A) Wireless networks do not need a router. B) Wireless networks can only connect PCs if they are in the line of sight. C) Any device with wireless capabilities can connect to the network. D) Wireless networks are usually faster than wired networks.

Computer Science & Information Technology