You work as a freelance security consultant. You are now working for a large government and have been contracted to create a stand-alone system that should attract malicious activity. The system should mimic an existing productive system but with fake non-sensitive data. The activity in this new system should be recorded so security analysts can review and identify patterns in the malicious activity. What best defines this type of system?

  • DDoS Mitigator
  • Ad hoc target
  • DMZ
  • Honeynet

CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
    • This question is filed here
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI