Deception And Disruption 2.5 Flashcards

1
Q

Decoy file located on a network file share

A

Honeyfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multiple linked honeypots that simulate a network environment

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of honeypot that imitates services

A

Low interaction honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of honey trap that incorporates an embedded beacon

A

Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The type of trap that responds with false domain names/URLs

A

DSN Sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The type of trap that is used to identify and block spammers

A

SPAM Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deception technique that allows security defenders to understand attacker behavior patterns and is intended to look legitimate to attract attackers

A

Honey Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly