CISSP Security Operations

Question 1

Harold set aside a portion of his organization’s IP address space that is not used by any legitimate system and instead used to identify malicious activity. What type of control has Harold built?

Page 1 out of 10