ISC2 CISSP Practice Question

During a weekly security operations review, the SOC manager reports that external scans are bypassing the perimeter firewall without triggering alerts. To gain deeper insight into adversary tactics, she proposes deploying an isolated system that intentionally exposes services so that every attacker interaction is logged and analyzed by the incident-response team. Which type of security resource BEST meets this goal?

  • Next-generation firewall with IPS capabilities

  • Network-based Intrusion Detection System (NIDS)

  • Virtualized sandbox detonation chamber

  • Honeypot

ISC2 CISSP
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot