GIAC Security Essentials GSEC Question # 38 Topic 4 Discussion

GIAC Security Essentials GSEC Question # 38 Topic 4 Discussion

GSEC Exam Topic 4 Question 38 Discussion:
Question #: 38
Topic #: 4

In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?


A.

Deploy the honey pot hosts as physically close as possible to production systems.


B.

Deploy the honey pot hosts in an unused part of your address space.


C.

Deploy the honey pot hosts to only respond to attacks.


D.

Deploy the honey pot hosts on used address space.


Get Premium GSEC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.