ECCouncil Exam Questions

What is this?

You are taking over the security of an existing network. You discover a machine that is not being
used as such, but has software on it that emulates the activity of a sensitive database server.

What is this?

A.
A Polymorphic Virus

B.
A Virus

C.
A reactive IDS.

D.
A Honey Pot

Explanation:

A honey pot is a device specifically designed to emulate a high value target such as a database
server or entire sub section of your network. It is designed to attract the hacker’s attention.