Multiple Choice
Which strategy is used in the implementation of intrusion deterrence?
A) Infiltrating online hacker groups
B) Installing honey pots to pose as important systems
C) Monitoring connection attempts to identify IP addresses of attackers
D) Using fake names to camouflage important systems
Correct Answer:

Verified
Correct Answer:
Verified
Q13: Which is NOT a function of an
Q14: Which type of intrusion-detection relies on people
Q15: Symantec Decoy Server does all of the
Q16: An intrusion-detection method that measures and monitors
Q17: _ is the process an intruder uses
Q19: Doing one's own detective work such as
Q20: Banishment vigilance is another name for _.
Q21: _ is a method of providing free
Q22: What might one see in an implementation
Q23: One type of intrusion-detection and avoidance which