FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Of the following, which is a collection of servers that was set up to attract hackers?
A
DMZ
B
Honeypot
C
Honeynet
D
VLAN
Explanation: 

Detailed explanation-1: -A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.

Detailed explanation-2: -A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies.

Detailed explanation-3: -A honeypot is a single service or computer on a network, that is configured to act as a decoy, attracting and trapping would-be attackers. A honeynet on the other hand is a network of honeypots that are used to lure in attackers and study their activities across multiple honeypots.

Detailed explanation-4: -The honeypot looks like a real computer system, with applications and data, fooling cybercriminals into thinking it’s a legitimate target. For example, a honeypot could mimic a company’s customer billing system-a frequent target of attack for criminals who want to find credit card numbers.

Detailed explanation-5: -Port scanners, such as Nmap and penetration testing tools, are useful for testing a honeypot setup. Attackers will often undertake their own port scan to look for vulnerabilities in a target network. Network admins can use Nmap to see what attackers see when they are poking around.

There is 1 question to complete.