Notifications
Clear all
Topic starter
07/07/2022 1:47 pm
A security analyst implemented a solution that would analyze the attacks that the organization’s firewalls failed to prevent.
The analyst used the existing systems to enact the solution and executed the following command.
S sudo nc -1 -v -c maildemon . py 25 caplog, txt
Which of the following solutions did the analyst implement?
- A . Log collector
- B . Crontab mail script
- C . Snikhole
- D . Honeypot
Suggested Answer: A