Kahoot 8 Honeypots Flashcards

1
Q

What are the two aims of honeypots

a. ) analysis
b. ) Collection
c. ) Modification
d. ) Compression

A

a & b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Honeypots are deliberately vulnerable to log attackers’ actions T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Honeypots are designed to be fake networks only T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Production Honeypots should do which two things?

a. ) Connect to production authentication systems
b. ) Should have different domain names
c. ) Minor or false positives
d. ) Emulate real production systems

A

c & d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Honeytokens could be which of the following?

a. ) browser cookies
b. ) Bogus email addresses
c. ) Forged executable files
d. ) All of the above

A

d.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Honeypots should have exceptionally long uptimes T or F

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Valhala provides which of the following features

a. ) Can include real files
b. ) Easy to configure
c. ) Medium-interaction type of honey pot
d. ) all of the above

A

d.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Research Honeypots are meantfor direct security value T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly