A high profile company has been receiving a high volume of attacks on their website. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implementated?

  1. DMZ(Demilitarized zone)

  2. Firewall

  3. New subnet

  4. Honeypot


Correct Option: D
Explanation:

To solve this question, the user needs to have knowledge of network security. The user must also understand the purpose of each option and how it relates to the problem of collecting information on attackers.

A. DMZ(Demilitarized zone): A DMZ is a network segment that is separated from the internal network by a firewall. It is used to host servers that need to be accessed by external users while keeping the internal network secure. While a DMZ can provide some protection for the internal network, it is not designed to collect information on attackers.

B. Firewall: Firewalls are devices that are used to control access to a network. They can be used to block incoming traffic from known attackers or to limit outgoing traffic to prevent sensitive information from leaving the network. While firewalls can provide some protection against attacks, they are not designed to collect information on attackers.

C. New subnet: A subnet is a logical division of a network. Creating a new subnet can help to isolate traffic and limit the scope of an attack. However, a new subnet does not provide any mechanism for collecting information on attackers.

D. Honeypot: A honeypot is a decoy system that is designed to attract attackers. It can be used to collect information on attackers and to study their behavior. A honeypot can be set up to look like a legitimate system or service, but it is actually designed to log all activity. This information can be used to track down and prosecute attackers.

Therefore, the correct answer is:

The Answer is: D (Honeypot)

Find more quizzes: