Which security type deliberately exposes a system's vulnerabilities or resources to an attacker?
A. Intrusion detection
B. Firewalls
C. Honeypots
D. Intrusion prevention
Answer: C. Honeypots
You might also like to view...
After an exception is handled, control resumes . This is known as the model of exception handling.
a) after the last Catch block, termination b) after the last Catch block, resumption c) just after the Throw point, termination d) just after the Throw point, resumption
Centrally controlled ____ DNS servers are known as root DNS servers.
A. public B. private C. local D. remote
Which of the following is an example of symmetric encryption? (Choose two.)
A) Advanced Encryption Standard (AES) B) Triple Data encryption Standard (3DES) C) RSA D) Pretty Good Privacy (PGP)
What are the biggest threats to a network in terms of security?
What will be an ideal response?