A state-sponsored threat actor has launched several successful attacks against a corporate network. Although the target has a robust patch management program in place, the attacks continue in depth and scope, and the security department has no idea how the attacks are able to gain access.
Given that patch management and vulnerability scanners are being used, which of the following would be used to analyze the attack methodology?
A . Rogue system detection
B . Honeypots
C . Next-generation firewall
D . Penetration test
Answer: B
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund