ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 80 - SY0-701 discussion

Report
Export

Which of the following can be used to identify potential attacker activities without affecting production servers?

A.
Honey pot
Answers
A.
Honey pot
B.
Video surveillance
Answers
B.
Video surveillance
C.
Zero Trust
Answers
C.
Zero Trust
D.
Geofencing
Answers
D.
Geofencing
Suggested answer: A

Explanation:

A honey pot is a system or a network that is designed to mimic a real production server and attract potential attackers. A honey pot can be used to identify the attacker's methods, techniques, and objectives without affecting the actual production servers.A honey pot can also divert the attacker's attention from the real targets and waste their time and resources12.

The other options are not effective ways to identify potential attacker activities without affecting production servers:

Video surveillance: This is a physical security technique that uses cameras and monitors to record and observe the activities in a certain area.Video surveillance can help to deter, detect, and investigate physical intrusions, but it does not directly identify the attacker's activities on the network or the servers3.

Zero Trust: This is a security strategy that assumes that no user, device, or network is trustworthy by default and requires strict verification and validation for every request and transaction.Zero Trust can help to improve the security posture and reduce the attack surface of an organization, but it does not directly identify the attacker's activities on the network or the servers4.

Geofencing: This is a security technique that uses geographic location as a criterion to restrict or allow access to data or resources.Geofencing can help to protect the data sovereignty and compliance of an organization, but it does not directly identify the attacker's activities on the network or the servers5.

Reference=1: CompTIA Security+ SY0-701 Certification Study Guide, page 542: Honeypots and Deception -- SY0-601 CompTIA Security+ : 2.1, video by Professor Messer3: CompTIA Security+ SY0-701 Certification Study Guide, page 974: CompTIA Security+ SY0-701 Certification Study Guide, page 985: CompTIA Security+ SY0-701 Certification Study Guide, page 99.

asked 02/10/2024
Keshava Channabyraiah
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first