________ are information system resources, such as firewalls, routers, Web servers, database servers and files, that only look like production systems to attract hackers and study their attempts to attack a network.
Fill in the blank(s) with correct word
Question 2
The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
Indicate whether the statement is true or false.