What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?
a. IDS
b. Router
c. Firewall
d. Honeypot
Answer: d. Honeypot
Computer Science & Information Technology
You might also like to view...
Match the following terms to their definition:
I. Surrogate key II. AutoNumber III. AutoNumber data type IV. Increment AutoNumber V. Random AutoNumber A. Default setting B. Unique and sequential C. Stores an integer that Access creates D. Can be negative or positive numbers E. Should never be used to count records
Computer Science & Information Technology
Which Linux distribution is Debian-based and used for penetration testing?
A. Red Hat Enterprise Linux (RHEL) B. Kali Linux C. Fedora D. Ubuntu
Computer Science & Information Technology