Deception And Disruption 2.5 Flashcards
1
Q
Decoy file located on a network file share
A
Honeyfile
2
Q
Multiple linked honeypots that simulate a network environment
A
Honeynet
3
Q
Type of honeypot that imitates services
A
Low interaction honeypot
4
Q
Type of honey trap that incorporates an embedded beacon
A
Honeytoken
5
Q
The type of trap that responds with false domain names/URLs
A
DSN Sinkhole
6
Q
The type of trap that is used to identify and block spammers
A
SPAM Traps
7
Q
Deception technique that allows security defenders to understand attacker behavior patterns and is intended to look legitimate to attract attackers
A
Honey Traps