Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?
A. Network based IDS
B. Firewall
C. Network based IPS
D. Honeynet
Answer: D. Honeynet
Computer Science & Information Technology
You might also like to view...
Which forms of inheritance are is-a relationships?
a. All forms of inheritance are is-a relationships. b. Only public and private. c. Only public and protected. d. Only public.
Computer Science & Information Technology
To select the best method for comparing alternatives, systems analysts may refer to the following guidelines:
What will be an ideal response?
Computer Science & Information Technology