Which of the following should an administrator implement to research current attack
methodologies?
A.
Design reviews
B.
Honeypot
C.
Vulnerability scanner
D.
Code reviews
Which of the following should an administrator implement to research current attack
methodologies?
Which of the following should an administrator implement to research current attack
methodologies?
A.
Design reviews
B.
Honeypot
C.
Vulnerability scanner
D.
Code reviews
What is a Honey Pot?
A honey pot is basically a server/machine that is setup up on your network to trick hackers into thinking it is a legitimate server with valuable data on it. So, basically companies can setup honey pot to trick the hackers to hack into it. The company can then use the data collected to study the hacking methodologies used by the hackers to harden their network/server architecture.