What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?
a. IDS
b. Router
c. Firewall
d. Honeypot
Answer: d. Honeypot
You might also like to view...
What do the calls to exit(…) do? When exit(0) and exit(1) are called, what receives these arguments and what is done with them?
a) The exit( ) function stops the program. The argument is discarded. b) The exit( ) function is obsolete. There is no longer any such function in the C++ libraries. c) The exit( ) function stops the program. The argument is passed to the operating system which uses it for an error code. d) The exit( ) function temporarily stops the program, and sends the argument to the operating system which uses it for an error code. The operating system restarts the program after fixing the error. e) The exit( ) function allows the systems programmer to escape when the power supply catches fire.
A particular element (row) of a relation is called a ________.
a) field b) primary key c) tuple d) result set
Many compilers automatically set all elements of integer-valued and real-valued arrays to ____.
A. blanks B. zeros C. null D. ones
When you create sparklines, clicking any cell in the data range selects all of the sparklines in the group. _________________________
Answer the following statement true (T) or false (F)