Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?



A. Security logs
B. Protocol analyzer
C. Audit logs
D. Honeypot


Answer: D


Learn More :

SY0-401

Learn More Multiple Choice Question :