A Chief Information Officer wants to monitor network breaching in a passive, controlled manner. Which of the
following would be BEST to implement?
A. Honeypot
B. Perimeter network
C. Intrusion prevention system
D. Port security
following would be BEST to implement?
A. Honeypot
B. Perimeter network
C. Intrusion prevention system
D. Port security