What is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion?

A. port scanner
B. sacrificial host
C. honey pot
D. content filter

Answer: C

Computer Science & Information Technology

You might also like to view...

A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil

Indicate whether the statement is true or false.

Computer Science & Information Technology

What are the three types of VLANs? (Select three.)

a. Port-based VLAN b. Tag-based VLAN c. Pd-based VLAN d. Protocol-based VLAN e. Label-based VLAN f. Routing-based VLAN

Computer Science & Information Technology