Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Posted by: Pdfprep Category: 312-39 Tags: , ,

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
A . De-Militarized Zone (DMZ)
B . Firewall
C . Honeypot
D . Intrusion Detection System

Answer: C

Explanation:

Reference: https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot

Leave a Reply

Your email address will not be published.