CompTIA Security+ SY0-701 Practice Question
An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?
Honeypot
Honeytoken
DNS Sinkhole
Intrusion Detection System (IDS)
Firewall
Honeynet