Last Updated on August 1, 2021 by Admin 1
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
- De-Militarized Zone (DMZ)
- Firewall
- Honeypot
- Intrusion Detection System