Which of the following methods could be used to provide a false customer database to the attacker?

A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?

A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?

A.
Radius

B.
DMZ

C.
Honeypot

D.
Kerberos



Leave a Reply 0

Your email address will not be published. Required fields are marked *