A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?
A.
Radius
B.
DMZ
C.
Honeypot
D.
Kerberos
A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?
A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?
A.
Radius
B.
DMZ
C.
Honeypot
D.
Kerberos