Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?
A.
DMZ
B.
Honeypot
C.
NIDS
D.
NIPS
Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?
Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?
A.
DMZ
B.
Honeypot
C.
NIDS
D.
NIPS