Which security type deliberately exposes a system's vulnerabilities or resources to an attacker?

A. Intrusion detection
B. Firewalls
C. Honeypots
D. Intrusion prevention


Answer: C. Honeypots

Computer Science & Information Technology

You might also like to view...

After an exception is handled, control resumes . This is known as the model of exception handling.

a) after the last Catch block, termination b) after the last Catch block, resumption c) just after the Throw point, termination d) just after the Throw point, resumption

Computer Science & Information Technology

Centrally controlled ____ DNS servers are known as root DNS servers.

A. public B. private C. local D. remote

Computer Science & Information Technology

Which of the following is an example of symmetric encryption? (Choose two.)

A) Advanced Encryption Standard (AES) B) Triple Data encryption Standard (3DES) C) RSA D) Pretty Good Privacy (PGP)

Computer Science & Information Technology

What are the biggest threats to a network in terms of security?

What will be an ideal response?

Computer Science & Information Technology