Free CompTIA Security+ SY0-701 Practice Question

An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?

  • Honeypot

  • DNS Sinkhole

  • Honeytoken

  • Firewall

  • Honeynet

  • Intrusion Detection System (IDS)

This question's topic:
CompTIA Security+ SY0-701 / 
Threats, Vulnerabilities, and Mitigations
Your Score:

Check or uncheck an objective to set which questions you will receive.