Which of the following rulebases will he use to accomplish the task?

Sam works as a Security Manager for ABC Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker.

Which of the following rulebases will he use to accomplish the task?
A . Backdoor rulebase
B . Network Honeypot rulebase
C . Exempt rulebase
D . SYN Protector rulebase

Answer: B

Latest GPPA Dumps Valid Version with 285 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments