Question 25 of 44 2.0 Points A. True B. False Question 26 of 44 2.0 Points A. Pr
ID: 3739568 • Letter: Q
Question
Question 25 of 44
2.0 Points
A. True
B. False
Question 26 of 44
2.0 Points
A. Production honeypots are used to trap all possible traffic, research honeypots are used to test honeypot design principles
B. Production honeypots are used to mitigate risk to corporate networks, research honeypots are used to test honeypot design principles
C. Production honeypots are used to mitigate risk to corporate networks, research honeypots are used to gather as much information as possible on attackers
D. Production honeypots are used to research honeypot design principles, research honeypots are used to mitigate risk to corporate networks
E. None of the above
Question 27 of 44
2.0 Points
What follows is a fill in the blank question with 2 blanks.
Question 28 of 44
2.0 Points
A. Entrapping potential hackers to commit acts they wouldn’t otherwise commit
B. Acting as systems which mask all internal network traffic addresses
C. Acting as dummy production systems which have some (real or fake) corporate data on them, which have some production value
D. Hiding production systems from view by masking their real IP addresses
E. None of the above
Question 29 of 44
2.0 Points
A. True
B. False
Question 25 of 44
2.0 Points
True or False: There is no way to create a wireless honeypot or honeynet to protect your wireless networkA. True
B. False
Reset SelectionMark for Review What's This?
Question 26 of 44
2.0 Points
Which of the following best describes the difference between research and production honeypots?A. Production honeypots are used to trap all possible traffic, research honeypots are used to test honeypot design principles
B. Production honeypots are used to mitigate risk to corporate networks, research honeypots are used to test honeypot design principles
C. Production honeypots are used to mitigate risk to corporate networks, research honeypots are used to gather as much information as possible on attackers
D. Production honeypots are used to research honeypot design principles, research honeypots are used to mitigate risk to corporate networks
E. None of the above
Reset SelectionMark for Review What's This?
Question 27 of 44
2.0 Points
What follows is a fill in the blank question with 2 blanks.
A honeypot which simulates only the basic services that attackers frequently request are Blank 1. Fill in the blank, read surrounding text. honeypots, while Blank 2. Fill in the blank, read surrounding text. honeypots simulate many services to waste an attacker's time.Mark for Review What's This?
Question 28 of 44
2.0 Points
Which of the following best describes the operating principle under which honeypots and honeynets operate?A. Entrapping potential hackers to commit acts they wouldn’t otherwise commit
B. Acting as systems which mask all internal network traffic addresses
C. Acting as dummy production systems which have some (real or fake) corporate data on them, which have some production value
D. Hiding production systems from view by masking their real IP addresses
E. None of the above
Reset SelectionMark for Review What's This?
Question 29 of 44
2.0 Points
True or False: honeyd and similar honeypots can emulate “real” TCP signatures to confuse attackersA. True
B. False
Reset SelectionExplanation / Answer
ANSWER :
Ans. 25
We can create wireless honeypots by using honeynet, honeyd, Tiny Honeypot and
KFSensor(for windows).
A. True
Ans. 26
Production honeypots are used to mitigate risk to corporate network and these
are easy to use and capture only limited information.
Research honeypots are used to gather as much information as possible on attackers
and these are primarily used by millitary,research or government organizations.
C.Production honeypots are used to mitigate risk to corporate networks, research honeypots
are used to gather as much information as possible on attackers
Ans. 28
Honeypots are fake information servers which are strategically positioned in a test
network, which contains false information disguised as files of classified nature.
These servers are initially configured in a way that is difficult but not impossible
to break into them by attacker, exposing it intentionally and making the highly attractive
for a hacker.The Server is loaded with some monitoring and tracking tools which monitor every
steps and trace activity left by attacker.
C. Acting as dummy production systems which have some (real or fake) corporate data on them,
which have some production value
Ans. 29
Honeyd can monitors unused IP space. When an intruder try to find an unused IP
Honeyd detects the probe and takes over that IP via ARP spoofing, this process
create a vertual honeypot for the intruder to interact with. The intuder thinks he
has break into within a successful hacked system.
A. True
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.