PrepAway - Latest Free Exam Questions & Answers

This method is called:

When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This
method is called:

PrepAway - Latest Free Exam Questions & Answers

A.
Vulnerability Analysis Systems

B.
Padded Cell

C.
Honey Pot

D.
File Integrity Checker

Explanation:
Padded cells take a different approach. Instead of trying to attract attackers with
tempting data, a padded cell operates in tandem with traditional IDS. When the IDS
detect attackers, it seamlessly transfers then to a special padded cell host.

One Comment on “This method is called:


Leave a Reply