Question: Question 1 4 ( 1 point ) After encountering a network attack in your enterprise network, the chief network security engineer assigned you a project.
Question point
After encountering a network attack in your enterprise network, the chief network security engineer assigned
you a project. The project was to create a vulnerable network that is similar to your enterprise network and
entices the threat actor to repeat the attack. This is to analyze the behavior and techniques the attacker is
using to ensure better defenses to your enterprise network in the future. Which of the following appliances
should you use?
You should use a honeynet
You should set up network access control.
You should use a proxy server.
You should set up behavioral IDS monitoring.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
