Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
A. Evil twin
B. Honeypot
C. DMZ
D. Honeynet
Answer: B. Honeypot
Computer Science & Information Technology
You might also like to view...
One way to detect rouge access points is by periodic site surveys
Indicate whether the statement is true or false.
Computer Science & Information Technology
You can learn the MAC address of your device by issuing the command ipconfig ________ at the command line
Fill in the blank(s) with correct word
Computer Science & Information Technology