Which system is John using to track the malicious hackers?

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based
systems. A project has been assigned to John to track malicious hackers and to strengthen the
company’s security system. John configures a computer system to trick malicious hackers into
thinking that it is the company’s main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based
systems. A project has been assigned to John to track malicious hackers and to strengthen the
company’s security system. John configures a computer system to trick malicious hackers into
thinking that it is the company’s main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

A.
Honeypot

B.
Intrusion Detection System (IDS)

C.
Bastion host

D.
Honeytokens

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *