You work for a company with a large network. Due to the size, the security administrator has set up multiple instances of decoy data on isolated network segments away from legitimate resources used to distract potential attackers from actual production data and assets on the real network. What term best describes this security concept?
Correct Incorrect Unanswered Report Issue Answer Description
A honeynet is used for monitoring a larger and/or more diverse network in which one honeypot may not be sufficient. When two or more honeypots are used on a network that forms a honeynet.
Wikipedia
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site which contains information or resources of value to attackers. It is actually isolated, monitored, and capable of blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as "baiting" a suspect.The main use for this network decoy is to distract potential attackers from more important information and machines on the real network, learn about the forms of attacks they can suffer, and examine such attacks during and after the exploitation of a honeypot.
It provides a way to prevent and see vulnerabilities in a specific network system. A honeypot is a decoy used to protect a network from present or future attacks.
Honeypot_(computing)#Honey_nets - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time