Notifications
Clear all
Topic starter
A security analyst implemented a solution that would analyze the attacks that the organization’s firewalls failed to prevent. The analyst used the existing systems to enact the solution and executed the following command.
S sudo nc -1 -v -c maildemon . py 25 caplog, txt
Which of the following solutions did the analyst implement?
- A . Log collector
B. Crontab mail script
C. Snikhole
D. Honeypot
Suggested Answer: A
Posted : 04/12/2022 4:20 pm