ISC Exam Questions

This method is called:

When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This
method is called:

A.
Vulnerability Analysis Systems

B.
Padded Cell

C.
Honey Pot

D.
File Integrity Checker

Explanation:
Padded cells take a different approach. Instead of trying to attract attackers with
tempting data, a padded cell operates in tandem with traditional IDS. When the IDS
detect attackers, it seamlessly transfers then to a special padded cell host.