单项选择题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A.NIPS
B.Honeypot
C.DMZ
D.NIDS
点击查看答案
相关考题
-
单项选择题
Whichofthefollowingwouldanattackerusetofootprintasystem?()
A.RADIUS
B.Password cracker
C.Port scanner
D.Man-in-the-middle attack -
单项选择题
WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
A.Intrusion detection
B.Virtualization
C.Kiting
D.Cloning -
单项选择题
WhichofthefollowingdescribesastaticNAT?()
A.A static NAT uses a one to many mapping.
B.A static NAT uses a many to one mapping.
C.A static NAT uses a many to many mapping.
D.A static NAT uses a one to one mapping.
