List of questions
Related questions
Question 42 - 312-38 discussion
You are taking over the security of an existing network. You discover a machine that is not being used as such, but has software on it that emulates the activity of a sensitive database server. What is this?
A.
A Polymorphic Virus
B.
A Virus
C.
A reactive IDS.
D.
A Honey Pot
Your answer:
0 comments
Sorted by
Leave a comment first