List of questions
Related questions
Question 542 - 312-50v12 discussion
As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?
A.
Probing system services and observing the three-way handshake
B.
Using honeypot detection tools like Send-Safe Honeypot Hunter
C.
Implementing a brute force attack to verify system vulnerability
D.
Analyzing the MAC address to detect instances running on VMware
Your answer:
0 comments
Sorted by
Leave a comment first