Which of the following should an administrator implement to research current attack methodologies?
A. Design reviews
B. Honeypot
C. Vulnerability scanner
D. Code reviews
2 Comments on “Which of the following should an administrator implement to research current attack methodologies?”
CSTsays:
What is a Honey Pot?
0
0
t-turbosays:
A honey pot is basically a server/machine that is setup up on your network to trick hackers into thinking it is a legitimate server with valuable data on it. So, basically companies can setup honey pot to trick the hackers to hack into it. The company can then use the data collected to study the hacking methodologies used by the hackers to harden their network/server architecture.
What is a Honey Pot?
0
0
A honey pot is basically a server/machine that is setup up on your network to trick hackers into thinking it is a legitimate server with valuable data on it. So, basically companies can setup honey pot to trick the hackers to hack into it. The company can then use the data collected to study the hacking methodologies used by the hackers to harden their network/server architecture.
0
0