Which of the following statements is true of honeypots?
A) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.
B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
C) They traverse available web links in an attempt to discover documents for indexing and retrieval.
D) They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.
D
You might also like to view...
In which of the following situations would a leader's situational control be considered high?
a. Leader-member relations good; task structure low; position power weak b. Leader-member relations poor; task structure low; position power weak c. Leader-member relations good; task structure high; position power weak d. Leader-member relations poor; task structure high; position power strong
Sheth and Sisodia say accessibility is ripest for improvement because most companies are either ineffectual or inefficient at developing it
Indicate whether the statement is true or false