You work as a freelance security consultant. You are now working for a large government and have been contracted to create a stand-alone system that should attract malicious activity. The system should mimic an existing productive system but with fake non-sensitive data. The activity in this new system should be recorded so security analysts can review and identify patterns in the malicious activity. What best defines this type of system?

  • Honeynet
  • DDoS Mitigator
  • DMZ
  • Ad hoc target

CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
    • This question is filed here
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance