Solved

Which Strategy Is Used in the Implementation of Intrusion Deterrence

Question 18

Multiple Choice

Which strategy is used in the implementation of intrusion deterrence?


A) Infiltrating online hacker groups
B) Installing honey pots to pose as important systems
C) Monitoring connection attempts to identify IP addresses of attackers
D) Using fake names to camouflage important systems

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions