CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-701 Practice Question

An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?

  • Honeynet

  • Firewall

  • DNS Sinkhole

  • Honeypot

  • Honeytoken

  • Intrusion Detection System (IDS)

Subscribe to avoid duplicate questions and track your progress over time

Your Score:
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
General Security Concepts
CompTIA Security+ SY0-701
  • General Security Concepts
  • Threats, Vulnerabilities, and Mitigations
    • This question is filed here
  • Security Architecture
  • Security Operations
  • Security Program Management and Oversight