Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
The correct answer is C. Deception technology.
Deception technology is used to lure attackers into false environments or decoy systems. These decoy systems are designed to mimic the appearance and behavior of real systems, applications, or data, with the purpose of attracting attackers and diverting their attention away from actual critical systems. Deception technology can include decoy servers, fake network segments, or deceptive data files.
It is not B, Shadow application means the applications run by other business units without explicit permission of the IT department. The answer should be Deception technology . eg Honey pot is a type of deception technology
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Emporeo
8 months, 1 week agoskaf
1 year, 2 months agoarifbhatkar
1 year, 4 months agoVOAKDO_cciso
1 year, 6 months agoPika26
1 year, 8 months agovernfwx
2 years, 4 months agoarifbhatkar
2 years, 4 months agoOtto_Aulicino
2 years, 11 months agoahmad_Hammad
3 years, 7 months agoe_karma
3 years, 9 months ago