Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 712-50 All Questions

View all questions & answers for the 712-50 exam

Exam 712-50 topic 1 question 389 discussion

Actual exam question from ECCouncil's 712-50
Question #: 389
Topic #: 1
[All 712-50 Questions]

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

  • A. Segmentation controls.
  • B. Shadow applications.
  • C. Deception technology.
  • D. Vulnerability management.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Emporeo
8 months, 1 week ago
Selected Answer: C
deception tech
upvoted 1 times
...
skaf
1 year, 2 months ago
Selected Answer: C
Deception technology
upvoted 1 times
...
arifbhatkar
1 year, 4 months ago
Selected Answer: C
The correct answer is C. Deception technology. Deception technology is used to lure attackers into false environments or decoy systems. These decoy systems are designed to mimic the appearance and behavior of real systems, applications, or data, with the purpose of attracting attackers and diverting their attention away from actual critical systems. Deception technology can include decoy servers, fake network segments, or deceptive data files.
upvoted 1 times
...
VOAKDO_cciso
1 year, 6 months ago
Selected Answer: C
HONEY POT: DECEPTION APP
upvoted 1 times
...
Pika26
1 year, 8 months ago
Answer is C.
upvoted 2 times
...
vernfwx
2 years, 4 months ago
Selected Answer: C
C instead
upvoted 2 times
...
arifbhatkar
2 years, 4 months ago
Correct answer is C
upvoted 2 times
...
Otto_Aulicino
2 years, 11 months ago
C is the answer. Even the previous question is the same question, written slightly differently.
upvoted 2 times
...
ahmad_Hammad
3 years, 7 months ago
It’s C not B
upvoted 1 times
...
e_karma
3 years, 9 months ago
It is not B, Shadow application means the applications run by other business units without explicit permission of the IT department. The answer should be Deception technology . eg Honey pot is a type of deception technology
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...