ExamGecko
Question list
Search
Search

Related questions











Question 439 - 312-50v12 discussion

Report
Export

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

A.
Detecting honeypots running on VMware
Answers
A.
Detecting honeypots running on VMware
B.
Detecting the presence of Honeyd honeypots
Answers
B.
Detecting the presence of Honeyd honeypots
C.
Detecting the presence of Snort_inline honeypots
Answers
C.
Detecting the presence of Snort_inline honeypots
D.
Detecting the presence of Sebek-based honeypots
Answers
D.
Detecting the presence of Sebek-based honeypots
Suggested answer: C
asked 18/09/2024
Karabo Manye
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first