Which of the following should an administrator implement to research current attack
methodologies?
A.
Design reviews
B.
Honeypot
C.
Vulnerability scanner
D.
Code reviews
Which of the following should an administrator implement to research current attack
methodologies?
Which of the following should an administrator implement to research current attack
methodologies?
A.
Design reviews
B.
Honeypot
C.
Vulnerability scanner
D.
Code reviews