You work as a freelance security consultant. You are now working for a large government and have been contracted to create a stand-alone system that should attract malicious activity. The system should mimic an existing productive system but with fake non-sensitive data. The activity in this new system should be recorded so security analysts can review and identify patterns in the malicious activity. What best defines this type of system?

Security+ SY0-501 Objectives

  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
    • This question is filed here
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI
Report Error