ISC Exam Questions

What is known as decoy system designed to lure a potential attacker away from critical systems?

What is known as decoy system designed to lure a potential attacker away from critical systems?

A.
Honey Pots

B.
Vulnerability Analysis Systems

C.
File Integrity Checker

D.
Padded Cells

Explanation:

Honey pots are decoy systems that are designed to lure a potential attacker away from
critical systems. Honey pots are designed to:
Divert an attacker from accessing critical systems,
Collect information about the attacker’s activity, and encourage the attacker to stay
on the system long enough for administrators to respond.