hiexam
eccouncil · 212-82 · Q427 · multiple_choice · topic_1

Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to…

Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to preconfigured commands. Identify the type of Honeypot deployed by Karter in the above scenario.
  • A.Low-interaction honeypot
  • B.Pure honeypot
  • C.Medium-interaction honeypot
  • D.High-interaction honeypot
Explanation
Selected Answer: C Low-interaction: These simulate only a limited # of services & applications of a target system or network Medium-interation: These honeypots simulate a real operating system, applications, and services of a target network High-interaction: these honeypots simulate all services and applications of a target network Pure honeypots: these honeypots emulate the real production network of a target organization

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.