A company discovers suspicious transactions that were entered into the company's database and attached to a user account that was created as a trap for malicious activity. Which of the following is the user account an example of?
A honeytoken is a fake or misleading piece of data that is used to detect unauthorized access or malicious activity. Honeytokens are a cybersecurity concept that can be used to track data and identify attackers:
Honeynet: A honeynet is relevant to network security, as it is a network of decoy systems designed to attract and analyze malicious traffic and attacks.
Honeypot: A honeypot is relevant to system security, as it is a single decoy system or service set up to lure attackers and study their behaviour. E.g., Fake SSH
Honeyfile: A honeyfile is relevant to file security, as it is a fake file designed to attract and detect unauthorized access or tampering.
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jennyka76
Highly Voted 4 months ago9149f41
Most Recent 2 months, 3 weeks ago9149f41
2 months, 3 weeks ago