____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation.

A. Log file monitors
B. Honeypots
C. Trap and trace systems
D. Packet exchangers


Answer: B

Trades & Technology

You might also like to view...

Answer the following statement(s) true (T) or false (F)

The food waste grinder should not discharge into a grease interceptor because the high-velocity flow from the food waste grinder would defeat the purpose of the interceptor.

Trades & Technology

The most popular universal joint design is called a ____.

A. ball and trunnion B. pumpkin C. cross and yoke D. swing axle

Trades & Technology

Areas of actively dividing cells are called:

a. epidermis c. ground tissue b. conducting tissue d. meristems

Trades & Technology

All of the following are parts of a balustrade except _____

A) a baluster B) a newel post C) nosing D) a handrail

Trades & Technology