What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?

a. IDS
b. Router
c. Firewall
d. Honeypot

Answer: d. Honeypot

Computer Science & Information Technology

You might also like to view...

Match the following terms to their definition:

I. Surrogate key II. AutoNumber III. AutoNumber data type IV. Increment AutoNumber V. Random AutoNumber A. Default setting B. Unique and sequential C. Stores an integer that Access creates D. Can be negative or positive numbers E. Should never be used to count records

Computer Science & Information Technology

Which Linux distribution is Debian-based and used for penetration testing?

A. Red Hat Enterprise Linux (RHEL) B. Kali Linux C. Fedora D. Ubuntu

Computer Science & Information Technology