New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC-Council Certified CISO (CCISO) 712-50 Question # 128 Topic 13 Discussion

ECCouncil EC-Council Certified CISO (CCISO) 712-50 Question # 128 Topic 13 Discussion

712-50 Exam Topic 13 Question 128 Discussion:
Question #: 128
Topic #: 13

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?


A.

Segmentation controls.


B.

Shadow applications.


C.

Deception technology.


D.

Vulnerability management.


Get Premium 712-50 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.