Sam works as a Security Manager for ABC Inc. He has been assigned a project to detect reconnoitering activities. For this purpose, he has deployed a system in the network that attracts the attention of an attacker.
Which of the following rulebases will he use to accomplish the task?
A . Backdoor rulebase
B . Network Honeypot rulebase
C . Exempt rulebase
D . SYN Protector rulebase
Answer: B
Latest GPPA Dumps Valid Version with 285 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund