This is a clever way to lure potential hackers in and log their behavior.
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone
Answer: B
You might also like to view...
Answer the following statements true (T) or false (F)
1) The XML declaration is mandatory. 2) All XML files must end in the .xml extension 3) A validating parser determines only if the document is well formed. 4) An XML document can optionally reference a DTD or schema that defines the proper structure of the document.
What does the following function do?
What will be an ideal response?
The ________ is an organization of professionals working in academia and specializing in information systems
Fill in the blank(s) with correct word
Which of the following is a task or process that runs in the background, behind the scenes?
A. program B. protocol C. service D. application