What is the BEST way to ensure that an intruder who successfully penetrates a network will be
detected before significant damage is inflicted?
A.
Perform periodic penetration testing
B.
Establish minimum security baselines
C.
Implement vendor default settings
D.
Install a honeypot on the network
Explanation:
Honeypots attract hackers away from sensitive systems and files. Since honeypots are closely
monitored, the intrusion is more likely to be detected before significant damage is inflicted.
Security baselines will only provide assurance that each platform meets minimum criteria.
Penetration testing is not as effective and can only be performed sporadically. Vendor default
settings are not effective.