ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 60 - ECSS discussion

Report
Export

Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.

Identify the type of security solution employed by Stephen in the above scenario.

A.

Firewall

Answers
A.

Firewall

B.

IDS

Answers
B.

IDS

C.

Honeypot

Answers
C.

Honeypot

D.

Proxy server

Answers
D.

Proxy server

Suggested answer: C

Explanation:

Stephen employed ahoneypotin the given scenario. A honeypot is a simulation of an IT system or software application that acts as bait to attract the attention of attackers. While it appears to be a legitimate target, it is actually fake and carefully monitored by an IT security team.The purpose of a honeypot includes distraction for attackers, threat intelligence gathering, and research/training for IT security professionals1.

EC-Council Certified Security Specialist (E|CSS) documents and study guide1.

asked 24/10/2024
DATA 7 DATA7
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first