ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 785 - N10-008 discussion

Report
Export

A Chief Information Officer wants to monitor network breaching in a passive, controlled manner. Which of the following would be best to implement?

A.
Honeypot
Answers
A.
Honeypot
B.
Perimeter network
Answers
B.
Perimeter network
C.
Intrusion prevention system
Answers
C.
Intrusion prevention system
D.
Port security
Answers
D.
Port security
Suggested answer: A

Explanation:

A honeypot is a decoy system that is designed to attract and trap hackers who attempt to breach the network. A honeypot mimics a real system or network, but contains fake or non-sensitive data and applications. A honeypot can be used to monitor network breaching in a passive, controlled manner, as it allows the network administrator to observe the hacker's behavior, techniques, and tools without compromising the actual network or data. A honeypot can also help to divert the hacker's attention from the real targets and collect forensic evidence for further analysis or prosecution.

asked 02/10/2024
Lucas Bila
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first