Kahoot 8 Honeypots Flashcards
What are the two aims of honeypots
a. ) analysis
b. ) Collection
c. ) Modification
d. ) Compression
a & b
Honeypots are deliberately vulnerable to log attackers’ actions T or F
True
Honeypots are designed to be fake networks only T or F
False
Production Honeypots should do which two things?
a. ) Connect to production authentication systems
b. ) Should have different domain names
c. ) Minor or false positives
d. ) Emulate real production systems
c & d
Honeytokens could be which of the following?
a. ) browser cookies
b. ) Bogus email addresses
c. ) Forged executable files
d. ) All of the above
d.)
Honeypots should have exceptionally long uptimes T or F
false
Valhala provides which of the following features
a. ) Can include real files
b. ) Easy to configure
c. ) Medium-interaction type of honey pot
d. ) all of the above
d.)
Research Honeypots are meantfor direct security value T or F
False