Which of the following will Mark use to attract theattackers for understanding their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to usetheir home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Mark is concerned about probable attackers will be able to penetrate the VPN.
Which of the following will Mark use to attract theattackers for understanding their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based network.
Mark wants to allow the remote travel agents to be able to access the corporate network so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to usetheir home computers but he is required to be assured that the information is not compromised by anyone because the security of client information is on the top priority for him. Mark is concerned about probable attackers will be able to penetrate the VPN.
Which of the following will Mark use to attract theattackers for understanding their methods?

A.
CIA Triangle

B.
Attack surface

C.
Honeypot

D.
Social engineering



Leave a Reply 0

Your email address will not be published. Required fields are marked *