ExamGecko
Question list
Search
Search

Related questions











Question 388 - 712-50 discussion

Report
Export

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

A.
Segmentation controls.
Answers
A.
Segmentation controls.
B.
Shadow applications.
Answers
B.
Shadow applications.
C.
Deception technology.
Answers
C.
Deception technology.
D.
Vulnerability management.
Answers
D.
Vulnerability management.
Suggested answer: B
asked 18/09/2024
Hicham Kaoussi
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first