What is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion?
A. port scanner
B. sacrificial host
C. honey pot
D. content filter
Answer: C
Computer Science & Information Technology
You might also like to view...
A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil
Indicate whether the statement is true or false.
Computer Science & Information Technology
What are the three types of VLANs? (Select three.)
a. Port-based VLAN b. Tag-based VLAN c. Pd-based VLAN d. Protocol-based VLAN e. Label-based VLAN f. Routing-based VLAN
Computer Science & Information Technology