Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
Answer: A. Honeynet
Computer Science & Information Technology
You might also like to view...
What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path?
What will be an ideal response?
Computer Science & Information Technology
The ________ in a table dictates what data can be stored in a field
A) field properties B) data type C) field name D) description
Computer Science & Information Technology
An Excel feature that helps you choose a chart type by previewing suggested charts based on patterns in your data is called ________
A) Embedded Charts B) Recommended Charts C) Line Charts D) Organization Charts
Computer Science & Information Technology
To force data into a selected number of pages, use the ________ command
Fill in the blank(s) with correct word
Computer Science & Information Technology