Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?
A. IDS
B. router
C. honeypot
D. firewall
Answer: C
You might also like to view...
Which of the following is not true about downloading data from the Internet?
A) A 32-Mbps connection only downloads 4 MB per second, because the connection is measured in bits per second and the file is measured in bytes. B) Home and cell phone Internet connection speeds are guaranteed. C) Downloading is the process of taking information from one computer and saving it to another computer. D) The download speed determines how quickly information is transferred from a computer on the Internet to the user's computer.
The timescale can display ____ tiers simultaneously.
A. two B. three C. six D. eleven
Which of the following is NOT an item generally included in a forensic kit?
A) Latex gloves B) General case intake form C) Flashlight D) USB external drive
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.
A. systematic sample B. stratified sample C. random sample D. comprehensive sample