Question 25:
Which of the following is a vulnerable system designed to detect and log unauthorized access?
Answer options:
A. SIEM B. Honeypot C. DMZ D. Proxy server
Answer correct:
B