In addition to securing the operating system of production honey pot hosts, what is recommended to prevent the honey pots from assuming the identities of production systems that could result in the denial of service for legitimate users?
A.
Deploy the honey pot hosts as physically close as possible to production systems.
B.
Deploy the honey pot hosts in an unused part of your address space.
C.
Deploy the honey pot hosts to only respond to attacks.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit