List of questions
Related questions
Question 454 - SY0-601 discussion
A company wants to deploy decoy systems alongside production systems in order to entice threat actors and to learn more about attackers. Which of the follow r 3 best describes these systems?
A.
DNS sinkholes
B.
Honey pots
C.
Virtual machines
D.
Neural networks
Your answer:
0 comments
Sorted by
Leave a comment first