List of questions
Related questions
Question 31 - 212-82 discussion
Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as the applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to pre-configured commands.
Identify the type of Honeypot deployed by Karter in the above scenario.
A.
Low-interaction honeypot
B.
Pure honeypot
C.
Medium-interaction honeypot
D.
High-interaction honeypot
Your answer:
0 comments
Sorted by
Leave a comment first