A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network?
A. DMZ
B. Content Filter
C. Botnet
D. Honeypot
Answer: D. Honeypot
Computer Science & Information Technology
You might also like to view...
Within an Access table, each row is a field and each column is called a record
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ____ is often used to store objects that are to be processed sequentially.
A. stack B. graph C. list D. array
Computer Science & Information Technology