A company wants to get alerts when others are researching and doing reconnaissance on the company. One approach would be to host a part of the infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach? A. Watering hole B. Bug bounty C. DNS sinkhole D. Honeypot  Correct Answer: D This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer