Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

Last Updated on August 15, 2021 by Admin 2

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

  • Segmentation controls.
  • Shadow applications.
  • Deception technology.
  • Vulnerability management.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments