Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

A. Evil twin
B. Honeypot
C. DMZ
D. Honeynet

Answer: B. Honeypot

Computer Science & Information Technology

You might also like to view...

One way to detect rouge access points is by periodic site surveys

Indicate whether the statement is true or false.

Computer Science & Information Technology

You can learn the MAC address of your device by issuing the command ipconfig ________ at the command line

Fill in the blank(s) with correct word

Computer Science & Information Technology