Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 297 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 297
Topic #: 1
[All 312-50v12 Questions]

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?

  • A. Detecting honeypots running on VMware
  • B. Detecting the presence of Snort_inline honeypots
  • C. Detecting the presence of Honeyd honeypots
  • D. Detecting the presence of Sebek-based honeypots
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shaody
3 months ago
Selected Answer: C
Attacker can identify the presence of honeyd honeypot by performing time-based TCP fingerprinting methods.
upvoted 1 times
...
sunce12
5 months ago
C. Detecting the presence of Honeyd honeypots
upvoted 1 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: C
CEHv12 - 1760 / 1759
upvoted 1 times
...
insaniunt
9 months ago
Selected Answer: C
C. Detecting the presence of Honeyd honeypots
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...