List of questions
Related questions
Question 64 - 312-38 discussion
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
A.
High-interaction honeypot
B.
Medium-interaction honeypot
C.
Honeyd
D.
Low-interaction honeypot
Your answer:
0 comments
Sorted by
Leave a comment first