Deception and Disruption Flashcards

Security+

1
Q

What is the primary purpose of a honeypot?

A

To attract and trap attackers, often machines, in a virtual environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a honeypot contribute to recon?

A

It allows observation and analysis of the attacker’s behavior and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of resources can a honeynet include?

A

Servers, workstations, routers, switches, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a honeynet?

A

A network of multiple honeypots that create a larger deception environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are honeynets beneficial?

A

They provide more sources of information and can create complex traps for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a honeyfile?

A

To attract attackers with fake files containing enticing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a honeyfile work?

A

It acts as bait; alerts are sent when the file is accessed by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a honeyfile?

A

A file named “passwords.txt” that is likely to attract attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are honeytokens used for?

A

To track malicious actors through traceable data added to the honeynet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do API credentials function as honeytokens?

A

They send notifications when used but do not grant actual access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a practical example of a honeytoken?

A

A fake email address added to a contact list for monitoring purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can honeytokens help in cybersecurity?

A

They provide insight into where data breaches originate if the tokens are stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of honeytokens can be used?

A

Database records, browser cookies, web page pixels, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly