exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 12 discussion

Actual exam question from ECCouncil's 212-82
Question #: 12
Topic #: 1
[All 212-82 Questions]

Karter, a security professional, deployed a honeypot on the organization's network for luring attackers who attempt to breach the network. For this purpose, he configured a type of honeypot that simulates a real OS as well as applications and services of a target network. Furthermore, the honeypot deployed by Karter only responds to preconfigured commands.
Identify the type of Honeypot deployed by Karter in the above scenario.

  • A. Low-interaction honeypot
  • B. Pure honeypot
  • C. Medium-interaction honeypot
  • D. High-interaction honeypot
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Sego87
1 month, 1 week ago
Selected Answer: C
Certified Cybersecurity Technician Courseware Module 07 Page 871-872
upvoted 1 times
...
044f354
1 month, 3 weeks ago
Selected Answer: C
Certified Cybersecurity Technician Courseware Module 07 Page 871-872 Low-interaction Honeypots Low-interaction honeypots emulate only a limited number of services and applications of a target system or network. Medium-interaction Honeypots Medium-interaction honeypots simulate a real OS as well as applications and services of a target network. High-Interaction Honeypots Unlike their low-and medium-interaction counterparts, high-interaction honeypots do not emulate anything; they run actual vulnerable services or software on production systems with real OS and applications. Pure Honeypots Pure honeypots emulate the real production network of a target organization.
upvoted 1 times
...
Raypapi
2 months, 1 week ago
Selected Answer: D
The correct answer is D. High-Interaction Honeypot. Karter's deployment of a honeypot that simulates a real OS, applications, and services of the target network suggests a high level of interaction between the honeypot and potential attackers. This type of honeypot aims to provide a realistic environment for attackers to interact with, making it more likely that they will reveal their intentions and methods.
upvoted 1 times
...
duke_of_kamulu
5 months ago
Selected Answer: C
Medium-interaction honeypots simulate a real OS as well as applications and services of a target network. They provide greater misconception of an OS than low-interaction honeypots. Therefore, it is possible to log and analyze more complex attacks. These honeypots capture more useful data than low-interaction honeypots. They can only respond to preconfigured commands; therefore, the risk of intrusion increases.
upvoted 2 times
...
aman_baik
5 months, 3 weeks ago
Selected Answer: C
Module 07 Page 871 Types of Honeypots Medium-interaction honeypots simulate a real OS as well as applications and services of a target network. They can only respond to preconfigured commands; therefore, the risk of intrusion increases.
upvoted 2 times
...
KnifeRing
6 months ago
Medium Interaction: simulate a real OS as well as applications and services of a target network. They provide greater misconception of an OS than low-interaction honeypots. Therefore, it is possible to log and analyze more complex attacks. These honeypots capture more useful data than low-interaction honeypots. They can only respond to preconfigured commands;
upvoted 2 times
...
duke_of_kamulu
7 months, 2 weeks ago
medium is correct answer
upvoted 1 times
...
kanchantanwani
10 months ago
Selected Answer: C
Low-interaction: These simulate only a limited # of services & applications of a target system or network Medium-interation: These honeypots simulate a real operating system, applications, and services of a target network High-interaction: these honeypots simulate all services and applications of a target network Pure honeypots: these honeypots emulate the real production network of a target organization
upvoted 4 times
...
bivixa2510
10 months ago
Selected Answer: C
Medium-interaction Honeypots: These honeypots simulate a real operating system, applications, and services of a target network Correct Answer: C
upvoted 1 times
...
keloki2020
10 months, 2 weeks ago
This is actually a Medium Interaction Honeypot.
upvoted 2 times
...
jRoger14
1 year, 3 months ago
Selected Answer: C
Focus on question phrase: "simulates a real OS ". About official documentation, only Medium-interaction honeypot simulates real Operating System.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago