PrepAway - Latest Free Exam Questions & Answers

Which of the following is a fake target that deters hackers from locating your real network?

Which of the following is a fake target that deters hackers from locating your real network?

PrepAway - Latest Free Exam Questions & Answers

A.
Honeypot

B.
KFSensor

C.
Malware

D.
Spyware

Explanation:

A honeypot is a term in computer terminology used for a trap that is set to detect, deflect, or in
some manner counteract attempts at unauthorized use of information systems. Generally it consists
of a computer, data, or a network site that appears to be part of a network, but is actually isolated,
and monitored, and which seems to contain information or a resource of value to attackers.
Answer option B is incorrect. KFSensor is a Windows-based honeypot Intrusion Detection System
(IDS). It acts as a honeypot to attract and log potential hackers by simulating vulnerable system
services and Trojans. It has highly configurable features of detailed logging, analysis of attack, and
security alerts. When using the KFSensor, a user can create different types of scenarios, such as what
action should be taken when access to a honeypot is attempted. KFSensor contains many innovative
and unique features, such as remote management, a Snort compatible signature engine, and
emulations of real servers (e.g. FTP, POP3, HTTP, Telnet and SMTP) to deceive the hacker and gain
more valuable information about his motives.
Answer option C is incorrect. The term malware refers to malicious software, which is a broad class
of malicious viruses, including spyware. Malware is designed to infiltrate or damage a computer
without the consent of the owner.
Answer option D is incorrect. Spyware is a program that takes partial control over a user’s computer
without user’s permission. Spyware programs can collect various types of personal information, such
as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also
interfere with the control of a user’s computer, such as installing additional software, redirecting
Web browser activities, accessing Web sites blindly, etc.


Leave a Reply