Certified Information Systems Auditor (CISA) Question:
Download Questions PDF

Which of the following acts as a decoy to detect active Internet attacks?

Answer:

1. Honeypots
2. Firewalls
3. Trapdoors
4. Traffic analysis

Answer: A

Download CISA Interview Questions And Answers PDF

Previous QuestionNext Question
Which of the following cryptography options would increase overhead/cost?Which of the following is the MOST effective control when granting temporary access to vendors?