Which of the following is a vulnerable system designed to detect and log unauthorized access?
A . SIEM
B . Honeypot
C . DMZ
D . Proxy server
Answer: B
Which of the following is a vulnerable system designed to detect and log unauthorized access?
A . SIEM
B . Honeypot
C . DMZ
D . Proxy server
Answer: B