Quiz 12: Using Canary Honeypots for Detection
A honeydoc mimics a legitimate system and logging access to that system. T/F
False
A honeypot is a resource that defends hackers from breaking into networks. T/F
False
Honeyd's job is to control systems with multiple configuration files. T/F
False Instead of mimicking a legitimate system and logging access to that system, a honey doc mimics a legitimate document and logs access to that document
When a hacker attacks a honeypot, the analyst can't access the logs generated by the honeypot system to see what damage was done. T/F
False Once an alert has been generated, an analyst has the ability to access the logs created by the honeypot system to see what the attacker did with the system.
honeydocs are extremely covert and hard to notice even by the most skilled hackers. T/F
False honeydocs aren't entirely covert, and even a relatively unskilled attacker will be able to notice
Another question for 9. A honeydoc mimics a legitimate document and logs access to that document. T/F
True
Honeypots are categorized by the level of interaction they provide and are most commonly designated as either high or low interactions. T/F
True
exploitable or nonexploitable honeypots are examples of ______________. Winnie the Pooh's honeypot A canary honeypot A honeypot A bear honeypot
A canary honeypot
What type of honeypot can mimic real services? A exploitable honeypot A business honeypot A non-exploitable honeypot A union honeypot
A exploitable honeypot
Kippo is a canary honeypot that can manage both Unix-based devices and network devices such as switches and routers. T/F
True
Another question for 1. a honeypot is a security resource which value lies in being attacked, compromised, or probed.
True
A low interaction Python honeypot that is designed to mimic a few specific services is called ________ honeypot. Terri's Bob's Tom's Nook's
Tom's
Another question for 2. A canary honeypot can mimic a production system and is displayed so it can serve as an early detection tool. T/F
True
Another question for 10. honeydocs is used in a variety of _______ and ______ scenarios. A. covert, detection B. response, security C. detection, response D. response, respond
detection, response
Another question for 5. A honeypot system generates _____ in the logs. A. questions B. alerts C. damages D. hash
alerts