A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:
Correct Incorrect Unanswered Report Issue Answer Description
Honeypot is a part of the infrastructure heavily monitored to attract hackers and learn about the exploits used on the network.
Wikipedia
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site which contains information or resources of value to attackers. It is actually isolated, monitored, and capable of blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as "baiting" a suspect.The main use for this network decoy is to distract potential attackers from more important information and machines on the real network, learn about the forms of attacks they can suffer, and examine such attacks during and after the exploitation of a honeypot.
It provides a way to prevent and see vulnerabilities in a specific network system. A honeypot is a decoy used to protect a network from present or future attacks.
Honeypot_(computing) - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time