List of questions
Related questions
Question 388 - 712-50 discussion
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
A.
Segmentation controls.
B.
Shadow applications.
C.
Deception technology.
D.
Vulnerability management.
Your answer:
0 comments
Sorted by
Leave a comment first