A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network?

A. DMZ
B. Content Filter
C. Botnet
D. Honeypot

Answer: D. Honeypot

Computer Science & Information Technology

You might also like to view...

Within an Access table, each row is a field and each column is called a record

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____ is often used to store objects that are to be processed sequentially.

A. stack B. graph C. list D. array

Computer Science & Information Technology