Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane's company?

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane's company?




A. Vulnerability scanner
B. Honeynet
C. Protocol analyzer
D. Port scanner


Answer: B


Learn More :

SY0-401

Learn More Multiple Choice Question :