Last Updated on August 1, 2021 by Admin
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
- De-Militarized Zone (DMZ)
- Firewall
- Honeypot
- Intrusion Detection System