An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
A . Firewall
B . Router
C . Intrusion detection system
D . Honeypot
Answer: D
Explanation:
Steven deployed a honeypot in the scenario. A honeypot is a simulation of an IT system or software application that acts as bait to attract the attention of attackers. While it appears to be a legitimate target, it is actually fake and carefully monitored by an IT security team. The purpose of a honeypot includes distraction (diverting attackers’ attention), threat intelligence (revealing attack methods), and research/training for security professionals1.
Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide1.
EC-Council Certified Security Specialist (E|CSS) course materials2.
Latest ECSS Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund