List of questions
Related questions
Question 586 - N10-008 discussion
A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?
A.
Perimeter network
B.
Honeypot
C.
Zero trust infrastructure
D.
Network segmentation
Your answer:
0 comments
Sorted by
Leave a comment first