List of questions
Related questions
Question 161 - H12-731_V2.0 discussion
Which of the following describes the business process of the network trapping scheme wrong?
(single selection).
A.
The attacker initiates a network scanning attack The purpose is to probe the network structure.
B.
The business that the attacker eventually attacks is a deliberately constructed counterfeit food business. Therefore, all the actions of the attacker are monitored and reported to the CIS platform
C.
When the access traffic reaches the trapping probe A collision between the probe needle and the trap will be used to send the access flow to the trap
D.
Trapping probes can analyze the frequency of scanning different destination IPs or ports for the same source address Then a virtual MAC responds to the attacker.
Your answer:
0 comments
Sorted by
Leave a comment first