List of questions
Related questions
Question 28 - ECSS discussion
An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
A.
Firewall
B.
Router
C.
Intrusion detection system
D.
Honeypot
Your answer:
0 comments
Sorted by
Leave a comment first