What is this?

You are taking over the security of an existing network. You discover a machine that is not being usedas such, but has software on it that emulates the activity of a sensitive database server. What is this?

You are taking over the security of an existing network. You discover a machine that is not being usedas such, but has software on it that emulates the activity of a sensitive database server. What is this?

A.
A Polymorphic Virus

B.
A Honey Pot

C.
A reactive IDS.

D.
A Virus



Leave a Reply 0

Your email address will not be published. Required fields are marked *