1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ELEN [110]
3 years ago
9

____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can pr

ovide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation.
Computers and Technology
1 answer:
lawyer [7]3 years ago
8 0

Answer:

Honeypots.

Explanation:

Honeypot:- It is a system that is attached to the network it sets itself up as a decoy to tempt cyber attackers and to deflect,detect attempts in an attempt to have unauthorized access to the systems.

It's function is to show itself as a target for attackers on the internet and to collect details and inform the defenders of any efforts to access honeypot by an unauthorized user.

So we conclude that honeypot is the answer.

You might be interested in
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Predict what the world would be like if no one tried to think critically. explain your predictions
Kay [80]

The world would be in chaos and we would all be dead duh.

7 0
2 years ago
Read the statements below. Select "W" if the statement describes the Windows OS. Select "L" if the statement describes the Linux
zhuklara [117]
<span>If we are assuming Desktops. I say this because Linux is most commonly used OS when it comes to Servers and embedded systems etc.

L - Linux
W - Windows
_L__customizable
_W__most commonly used OS
__W_proprietary
_L__freeware <--- They want Linux here but it is not freeware. Clueless teacher/book
__L_unpaid developer <----They want Linux here too but this is not true. I guess they have not heard of RedHat . More clueless teachers....</span>
8 0
3 years ago
Project team member Kevin needs to define the use of change bars to show deleted and modified paragraphs. Under which standards
saw5 [17]

Answer: C) Update Standards

Explanation: Hope this help :D

4 0
3 years ago
Why won't my brainly ads load? does anybody know how to fix it?
lozanna [386]

Answer:

if you want to not watch ads

Explanation:

there is a chrome extension called brainly RIP. it unblocks answers
link: https://chrome-stats.com/d/pkkodakbgglcjelcimaanalpaepnfbal

7 0
2 years ago
Other questions:
  • A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her
    10·1 answer
  • 6. Which of the following is malware? (1 point)
    15·2 answers
  • Which recovery method allows users to back up their personal files to an external drive or network share without administrative
    11·1 answer
  • Assignment 2: Room area
    14·1 answer
  • RAM
    14·1 answer
  • Which device or appliance emits radio waves
    7·1 answer
  • Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
    15·2 answers
  • Using SQL
    11·1 answer
  • Can someone help me?
    7·2 answers
  • What is an issue with using cloud computing?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!