Which of the following can be used by an administrator to proactively collect information on
attackers and their attempted methods of gaining access to the internal network?
A.
DMZ
B.
Honeypot
C.
NIDS
D.
NIPS
Which of the following can be used by an administrator to proactively collect information on
attackers and their attempted methods of gaining access to the internal network?
Which of the following can be used by an administrator to proactively collect information on
attackers and their attempted methods of gaining access to the internal network?
A.
DMZ
B.
Honeypot
C.
NIDS
D.
NIPS