Certified Information Systems Auditor (CISA) Question:
Which of the following acts as a decoy to detect active Internet attacks?

Answer:
1. Honeypots
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
Previous Question | Next Question |
Which of the following cryptography options would increase overhead/cost? | Which of the following is the MOST effective control when granting temporary access to vendors? |