The BEST method for detecting and monitoring a hacker’s activities without exposing information assets to unnecessary risk is to utilize:
A. firewalls.
B. bastion hosts.
C. decoy files.
D. screened subnets.
The BEST method for detecting and monitoring a hacker’s activities without exposing information assets to unnecessary risk is to utilize:
A. firewalls.
B. bastion hosts.
C. decoy files.
D. screened subnets.