Certified Information Systems Auditor (CISA) Question: Download Questions PDF
Which of the following acts as a decoy to detect active Internet attacks?
Answer:
1. Honeypots
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
2. Firewalls
3. Trapdoors
4. Traffic analysis
Answer: A
Download CISA Interview Questions And Answers
PDF
Previous Question | Next Question |
Which of the following cryptography options would increase overhead/cost? | Which of the following is the MOST effective control when granting temporary access to vendors? |