PrepAway - Latest Free Exam Questions & Answers

This method is called:

When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This
method is called:

PrepAway - Latest Free Exam Questions & Answers

A.
Vulnerability Analysis Systems

B.
Padded Cell

C.
Honey Pot

D.
File Integrity Checker

Explanation:
Padded cells take a different approach. Instead of trying to attract attackers with tempting data, a
padded cell operates in tandem with traditional IDS. When the IDS detect attackers, it seamlessly
transfers then to a special padded cell host.


Leave a Reply