# 212-82 — Question 427

**Type:** multiple_choice
**Topics:** topic_1

## Question

Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to preconfigured commands.
Identify the type of Honeypot deployed by Karter in the above scenario.

## Correct Answer

_See scenario._

## Explanation

Selected Answer: C
Low-interaction: These simulate only a limited # of services & applications of a target system or network
Medium-interation: These honeypots simulate a real operating system, applications, and services of a target network
High-interaction: these honeypots simulate all services and applications of a target network 
Pure honeypots: these honeypots emulate the real production network of a target organization

**Reference:** examtopics_top_comment

---
Source: https://hiexam.net/q/eccouncil/212-82/427  
Practice (tracked): https://hiexam.net/study/212-82/practice