ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 586 - N10-008 discussion

Report
Export

A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?

A.
Perimeter network
Answers
A.
Perimeter network
B.
Honeypot
Answers
B.
Honeypot
C.
Zero trust infrastructure
Answers
C.
Zero trust infrastructure
D.
Network segmentation
Answers
D.
Network segmentation
Suggested answer: B

Explanation:

The solution that the security team is implementing to record the actions of potential attackers in an isolated network is a honeypot. A honeypot is a decoy system that simulates a real network or service, but has no actual value or function. A honeypot is designed to attract and trap attackers who try to infiltrate or compromise the network, and then monitor and analyze their behavior and techniques. A honeypot can help the security team learn about the attackers' motives, methods, and tools, and improve their defense strategies accordingly. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.

asked 02/10/2024
Marco Morsiani
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first