A ____ server is a machine that is placed in the DMZ to attract hackers and direct them away from the servers being protected.

A. flytrap
B. DNS server
C. honeypot
D. bastion host


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The base class access specification can be viewed as a filter that base class members must pass through when becoming inherited members of a derived class. 2. When arguments must be passed to the base class constructor, they are passed from the derived class constructor's header line. 3. A base class cannot contain a pointer to one of its derived classes. 4. To declare a C-string, you should use the type expression string *.

Computer Science & Information Technology

Which of the following statements about directories is false?

a) Directories contain the names and locations of other files in the file system. b) Directories often store user data. c) Directions may contain the access times and modified times of files. d) Directories may contain a “type” field that specifies a description of a file’s purpose.

Computer Science & Information Technology

Microsoft Office Sway allows you to add interactive content to your presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

A secondary zone is an additional copy of DNS zone data hosted on a DNS server that is another source for this zone information

a. Copy b. Secondary c. Stub d. None of the above

Computer Science & Information Technology