Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
Honeypot
A honeypot is an information system resource that is expressly set up to attract and trap people who attempt to penetrate an organization’s networkIt can log port access attempts or monitor an attacker's keystrokes.
These could be early warnings of a more concerted attack. (P.1512/1496)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Daniel8660
8 months, 3 weeks agoANDRESCB1988
1 year, 11 months agoripple
2 years, 1 month ago