ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 454 - SY0-601 discussion

Report
Export

A company wants to deploy decoy systems alongside production systems in order to entice threat actors and to learn more about attackers. Which of the follow r 3 best describes these systems?

A.
DNS sinkholes
Answers
A.
DNS sinkholes
B.
Honey pots
Answers
B.
Honey pots
C.
Virtual machines
Answers
C.
Virtual machines
D.
Neural networks
Answers
D.
Neural networks
Suggested answer: B

Explanation:

Honey pots are decoy systems or resources that are designed to attract and deceive threat actors and to learn more about their motives, techniques, etc. They can be deployed alongside production systems to create an illusion of a vulnerable target and divert attacks away from the real systems. They can also collect valuable information and evidence about the attackers and their activities for further analysis or prosecution.

asked 02/10/2024
Maurizio Budicin
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first