A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:
Honeynet
Rogue access point
Honeypot
Flood guard
Honeypot is a part of the infrastructure heavily monitored to attract hackers and learn about the exploits used on the network.
AI Generated Content may display inaccurate information, always double-check anything important.
Check or uncheck an objective to set which questions you will receive.
Join premium for unlimited access and more features
Create an account or sign in to access free study materials & subscriptions.