This is a clever way to lure potential hackers in and log their behavior.

A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) The XML declaration is mandatory. 2) All XML files must end in the .xml extension 3) A validating parser determines only if the document is well formed. 4) An XML document can optionally reference a DTD or schema that defines the proper structure of the document.

Computer Science & Information Technology

What does the following function do?

What will be an ideal response?

Computer Science & Information Technology

The ________ is an organization of professionals working in academia and specializing in information systems

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a task or process that runs in the background, behind the scenes?

A. program B. protocol C. service D. application

Computer Science & Information Technology