Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS


Answer: A. Honeynet

Computer Science & Information Technology

You might also like to view...

What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path?

What will be an ideal response?

Computer Science & Information Technology

The ________ in a table dictates what data can be stored in a field

A) field properties B) data type C) field name D) description

Computer Science & Information Technology

An Excel feature that helps you choose a chart type by previewing suggested charts based on patterns in your data is called ________

A) Embedded Charts B) Recommended Charts C) Line Charts D) Organization Charts

Computer Science & Information Technology

To force data into a selected number of pages, use the ________ command

Fill in the blank(s) with correct word

Computer Science & Information Technology