Multiple Choice
What type of device should you install as a decoy to lure potential attackers?
A) honeypot
B) Trojan
C) IPS
D) VPN
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: Describe the purpose of a protocol analyzer
Q17: Which facet of securing access to network
Q19: Which protocol is used to encrypt data
Q20: _ authentication means the identity of both
Q23: What is an IDS?
Q27: What are the two VPN modes that
Q28: What is a VPN?
Q30: What is created when a packet is
Q37: How the network resources are to be
Q40: Match each item with a statement below.<br>a.digital