List of questions
Related questions
Question 358 - 312-38 discussion
You are using more than the safety of the existing network. You'll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?
A.
The reactive IDS
B.
Honey Pot
C.
None
D.
Virus
E.
The polymorphic virus
Your answer:
0 comments
Sorted by
Leave a comment first