Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

Last Updated on August 1, 2021 by Admin 1

Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?

  • De-Militarized Zone (DMZ)
  • Firewall
  • Honeypot
  • Intrusion Detection System
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments