Short Answer
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: Those who hack into computers do so
Q6: Signature-based approaches attempt to define normal, or
Q7: _ involves the collection of data relating
Q8: A _ monitors the characteristics of a
Q9: Intruders typically use steps from a common
Q11: The primary purpose of an IDS is
Q13: Network-based intrusion detection makes use of signature
Q14: The purpose of the _ module is
Q15: Running a packet sniffer on a workstation
Q24: Intrusion detection is based on the assumption