An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
A . Firewall
B . Router
C . Intrusion detection system
D . Honeypot
Answer: D
Explanation:
Steven deployed a honeypot in the scenario. A honeypot is a simulation of an IT system or software application that acts as bait to attract the attention of attackers. While it appears to be a legitimate target, it is actually fake and carefully monitored by an IT security team. The purpose of a honeypot includes distraction (diverting attackers’ attention), threat intelligence (revealing attack methods), and research/training for security professionals1.
Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide1.
EC-Council Certified Security Specialist (E|CSS) course materials2.
Latest ECSS Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund