What is the BEST way to ensure that an intruder who successfully penetrates a network will be detected before
significant damage is inflicted?

A.
Perform periodic penetration testing
B.
Establish minimum security baselines
C.
Implement vendor default settings
D.
Install a honeypot on the network
Explanation:
Honeypots attract hackers away from sensitive systems and files. Since honeypots are closely monitored, the intrusion is more likely to be detected before significant damage is inflicted. Security baselines will only provide assurance that each platform meets minimum criteria. Penetration testing is not as effective and can only be performed sporadically. Vendor default settings are not effective.