Which of the following is this an example of?

A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?

A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?

A.
Firewall

B.
Man-in-the-middle

C.
Proxy server

D.
Honeypot



Leave a Reply 0

Your email address will not be published. Required fields are marked *