List of questions
Related questions
Question 60 - 112-51 discussion
Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
A.
Firewall
B.
Honeypot
C.
IDS
D.
Proxy server
Your answer:
0 comments
Sorted by
Leave a comment first