单项选择题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A.NIPS B.Honeypot C.DMZ D.NIDS
单项选择题 Whichofthefollowingwouldanattackerusetofootprintasystem?()
单项选择题 WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
单项选择题 WhichofthefollowingdescribesastaticNAT?()