Quiz 12: Using Canary Honeypots for Detection

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A honeydoc mimics a legitimate system and logging access to that system. T/F

False

A honeypot is a resource that defends hackers from breaking into networks. T/F

False

Honeyd's job is to control systems with multiple configuration files. T/F

False Instead of mimicking a legitimate system and logging access to that system, a honey doc mimics a legitimate document and logs access to that document

When a hacker attacks a honeypot, the analyst can't access the logs generated by the honeypot system to see what damage was done. T/F

False Once an alert has been generated, an analyst has the ability to access the logs created by the honeypot system to see what the attacker did with the system.

honeydocs are extremely covert and hard to notice even by the most skilled hackers. T/F

False honeydocs aren't entirely covert, and even a relatively unskilled attacker will be able to notice

Another question for 9. A honeydoc mimics a legitimate document and logs access to that document. T/F

True

Honeypots are categorized by the level of interaction they provide and are most commonly designated as either high or low interactions. T/F

True

exploitable or nonexploitable honeypots are examples of ______________. Winnie the Pooh's honeypot A canary honeypot A honeypot A bear honeypot

A canary honeypot

What type of honeypot can mimic real services? A exploitable honeypot A business honeypot A non-exploitable honeypot A union honeypot

A exploitable honeypot

Kippo is a canary honeypot that can manage both Unix-based devices and network devices such as switches and routers. T/F

True

Another question for 1. a honeypot is a security resource which value lies in being attacked, compromised, or probed.

True

A low interaction Python honeypot that is designed to mimic a few specific services is called ________ honeypot. Terri's Bob's Tom's Nook's

Tom's

Another question for 2. A canary honeypot can mimic a production system and is displayed so it can serve as an early detection tool. T/F

True

Another question for 10. honeydocs is used in a variety of _______ and ______ scenarios. A. covert, detection B. response, security C. detection, response D. response, respond

detection, response

Another question for 5. A honeypot system generates _____ in the logs. A. questions B. alerts C. damages D. hash

alerts


संबंधित स्टडी सेट्स

DIET FINAL CHP. 13 TRACE MINERALS

View Set

Chapter 16-17: Acid-Base Equilibria

View Set

Excel Final Exam Review Higher Difficulty Questions

View Set

chapter 8 political participation and voting

View Set

DECA- Principles of Finance Performance Indicators

View Set