List of questions
Related questions
Question 785 - N10-008 discussion
A Chief Information Officer wants to monitor network breaching in a passive, controlled manner. Which of the following would be best to implement?
A.
Honeypot
B.
Perimeter network
C.
Intrusion prevention system
D.
Port security
Your answer:
0 comments
Sorted by
Leave a comment first