List of questions
Related questions
Question 80 - SY0-701 discussion
Which of the following can be used to identify potential attacker activities without affecting production servers?
A.
Honey pot
B.
Video surveillance
C.
Zero Trust
D.
Geofencing
Your answer:
0 comments
Sorted by
Leave a comment first