ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 31 - 212-82 discussion

Report
Export

Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as the applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to pre-configured commands.

Identify the type of Honeypot deployed by Karter in the above scenario.

A.
Low-interaction honeypot
Answers
A.
Low-interaction honeypot
B.
Pure honeypot
Answers
B.
Pure honeypot
C.
Medium-interaction honeypot
Answers
C.
Medium-interaction honeypot
D.
High-interaction honeypot
Answers
D.
High-interaction honeypot
Suggested answer: A

Explanation:

A low-interaction honeypot is a type of honeypot that simulates a real OS as well as the applications and services of a target network, but only responds to pre-configured commands. It is designed to capture basic information about the attacker, such as their IP address, tools, and techniques. A lowinteraction honeypot is easier to deploy and maintain than a high-interaction honeypot, which fully emulates a real system and allows the attacker to interact with it. A pure honeypot is a real system that is intentionally vulnerable and exposed to attackers. A medium-interaction honeypot is a type of honeypot that offers more functionality and interactivity than a low-interaction honeypot, but less than a high-interaction honeypot.

asked 18/09/2024
DAVID Durbin
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first