PrepAway - Latest Free Exam Questions & Answers

What is the primary goal of setting up a honey pot?

What is the primary goal of setting up a honey pot?

PrepAway - Latest Free Exam Questions & Answers

A.
To lure hackers into attacking unused systems

B.
To entrap and track down possible hackers

C.
To set up a sacrificial lamb on the network

D.
To know when certain types of attacks are in progress and to learn about attack techniques so the network
can be fortified.

Explanation:
A honeypot system is a computer that usually sits in the screened subnet, or DMZ, and attempts to lure
attackers to it instead of to actual production computers. To make a honeypot system lure attackers,
administrators may enable services and ports that are popular to exploit. Some honeypot systems have
services emulated, meaning the actual service is not running but software that acts like those services is
available. Honeypot systems can get an attacker’s attention by advertising themselves as easy targets to
compromise. They are configured to look like regular company systems so that attackers will be drawn to them
like bears are to honey.
Honeypots can work as early detection mechanisms, meaning that the network staff can be alerted that an
intruder is attacking a honeypot system, and they can quickly go into action to make sure no production
systems are vulnerable to that specific attack type.
Organizations use these systems to identify, quantify, and qualify specific traffic types to help determine their
danger levels. The systems can gather network traffic statistics and return them to a centralized location for
better analysis. So as the systems are being attacked, they gather intelligence information that can help the
network staff better understand what is taking place within their environment.
Incorrect Answers:
A: A honeypot does act as a decoy system in that it can lure hackers into attacking the honeypot system
instead of live production servers. However, this is not the primary goal of a honeypot. The primary goal is to
learn about attack techniques so the network can be fortified.
B: Entrapping and tracking down attackers is not the goal of a honeypot. Learning about possible attack
techniques is more valuable to a company.
C: It is not the goal of a honeypot to set up a sacrificial lamb on the network.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, p. 655


Leave a Reply