ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 28 - ECSS discussion

Report
Export

An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.

Identify the type of device deployed by Steven in the above scenario.

A.

Firewall

Answers
A.

Firewall

B.

Router

Answers
B.

Router

C.

Intrusion detection system

Answers
C.

Intrusion detection system

D.

Honeypot

Answers
D.

Honeypot

Suggested answer: D

Explanation:

Steven deployed ahoneypotin the scenario. A honeypot is a simulation of an IT system or software application that acts as bait to attract the attention of attackers. While it appears to be a legitimate target, it is actually fake and carefully monitored by an IT security team.The purpose of a honeypot includes distraction (diverting attackers' attention), threat intelligence (revealing attack methods), and research/training for security professionals1.

EC-Council Certified Security Specialist (E|CSS) documents and study guide1.

EC-Council Certified Security Specialist (E|CSS) course materials2.

asked 24/10/2024
Leon Duke
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first