Multiple Choice
Symantec Decoy Server does all of the following EXCEPT:
A) record all traffic related to an intrusion attack
B) simulate incoming mail server functions
C) simulate outgoing mail server functions
D) track attacking packets to their source
Correct Answer:

Verified
Correct Answer:
Verified
Q10: Which intrusion detection strategy monitors and compares
Q11: An intrusion-detection system detecting a series of
Q12: Following rules and learning from experience as
Q13: Which is NOT a function of an
Q14: Which type of intrusion-detection relies on people
Q16: An intrusion-detection method that measures and monitors
Q17: _ is the process an intruder uses
Q18: Which strategy is used in the implementation
Q19: Doing one's own detective work such as
Q20: Banishment vigilance is another name for _.