A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?
A.
Firewall
B.
Man-in-the-middle
C.
Proxy server
D.
Honeypot
A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?
A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?
A.
Firewall
B.
Man-in-the-middle
C.
Proxy server
D.
Honeypot