When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This
method is called:
A.
Vulnerability Analysis Systems
B.
Padded Cell
C.
Honey Pot
D.
File Integrity Checker
Explanation:
Padded cells take a different approach. Instead of trying to attract attackers with
tempting data, a padded cell operates in tandem with traditional IDS. When the IDS
detect attackers, it seamlessly transfers then to a special padded cell host.
check
0
0