Which of the following security methods is used to attract users attempting to gain unauthorized access to
various systems within a single network?
A.
Network based IDS
B.
Firewall
C.
Network based IPS
D.
Honeynet
Which of the following security methods is used to attract users attempting to gain unauthorized access to
various systems within a single network?
Which of the following security methods is used to attract users attempting to gain unauthorized access to
various systems within a single network?
A.
Network based IDS
B.
Firewall
C.
Network based IPS
D.
Honeynet