This is a clever way to lure potential hackers in and log their behavior.

A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone

Answer: B

Computer Science & Information Technology

You might also like to view...

The ________ function displays the current date and time in a cell

Fill in the blank(s) with correct word

Computer Science & Information Technology

What does the term alignment mean? What types of alignment options are there?

What will be an ideal response?

Computer Science & Information Technology