A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to bypass the company's content filter and browse unapproved and non-work related sites while at work. Which of the following tools could BEST be used to determine how the employee is connecting to the reverse proxy?

A. Port scanner
B. Vulnerability scanner
C. Honeypot
D. Protocol analyzer


Answer: C. Honeypot

Computer Science & Information Technology

You might also like to view...

Software is simply a collection of one or more computer ____ containing a list of instructions for the microprocessor.

A. programs B. codes C. languages D. objects

Computer Science & Information Technology

Explain why executions are always strict even if read locks are released after the last operation of a transaction but before its commitment. Give an improved statement of Rule 2

What will be an ideal response?

Computer Science & Information Technology

In Java, there is one way to make an application program create a window.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ identifies which data markers are associated with each data series.

A. x-axis B. y-axis C. chart area D. legend

Computer Science & Information Technology