What device would you use to attract potential attacks,so that you could safely monitor the activity and discover the intentions of the attacker?
A) Firewall
B) Antivirus
C) IDS
D) Honeypot
Correct Answer:
Verified
Q6: Which of the following is NOT a
Q7: The nuisance of web pages that automatically
Q8: Your boss would like you to implement
Q9: What does a host-based IDS monitor?
A)A single
Q10: One of the advantages of HIDS is
Q12: According to SANS Internet Storm Center,the average
Q13: The main purpose of a honeypot is
A)To
Q14: Antispam does all of the following EXCEPT:
A)Blacklisting
B)Malicious
Q15: Windows Defender does all of the following
Q16: Zone Alarm,Windows ICF,and iptables are all examples
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents