PdfPrep.com

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
A . De-Militarized Zone (DMZ)
B . Firewall
C . Honeypot
D . Intrusion Detection System

Answer: C

Explanation:

Reference: https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot

Exit mobile version