Network Security 1.0 | |
Final Exam Answers | |
This Chapters 11 - 12 | |
Chapters 11 - 12 Exam Answers | Online Test |
Next Chapters 13 - 14 | |
Chapters 13 - 14 Exam Answers | Online Test |
Network Security Packet Tracer Activity Files Answers | |
11.4.6 Packet Tracer – Implement a Local SPAN Answers | |
Network Security Student Lab Source Files Answers | |
NA |
Which IPS signature trigger category uses a decoy server to divert attacks away from production devices?
- pattern-based detection
- anomaly-based detection
- honey pot-based detection
- policy-based detection
Answers Explanation & Hints: Honey pot-based detection uses a decoy server to attract attacks and to divert attacks away from production devices. Use of a honey pot can give administrators time to analyze incoming attacks and malicious traffic patterns to tune sensor signatures.
Network Security 1.0 | |
Final Exam Answers | |
This Chapters 11 - 12 | |
Chapters 11 - 12 Exam Answers | Online Test |
Next Chapters 13 - 14 | |
Chapters 13 - 14 Exam Answers | Online Test |
Network Security Packet Tracer Activity Files Answers | |
11.4.6 Packet Tracer – Implement a Local SPAN Answers | |
Network Security Student Lab Source Files Answers | |
NA |