Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
A.
Network based IDS
B.
Firewall
C.
Network based IPS
D.
Honeynet
Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
A.
Network based IDS
B.
Firewall
C.
Network based IPS
D.
Honeynet