Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?

Which of the following can be used by an administrator to proactively collect information on
attackers and their attempted methods of gaining access to the internal network?

Which of the following can be used by an administrator to proactively collect information on
attackers and their attempted methods of gaining access to the internal network?

A.
DMZ

B.
Honeypot

C.
NIDS

D.
NIPS



Leave a Reply 0

Your email address will not be published. Required fields are marked *