ISACA Exam Questions

what aspect of an authorized honeypot?

An IS auditor should be MOST concerned with what aspect of an authorized honeypot?

A.
The data collected on attack methods

B.
The information offered to outsiders on thehoneypot

C.
The risk that thehoneypot could be used to launch further attacks on the organization’s
infrastructure

D.
The risk that thehoneypot would be subject to a distributed denial-of-service attack

Explanation:
Choice C represents the organizational risk that the honeypot could be used as a point of access to
launch further attacks on the enterprise’s systems. Choices A and B are purposes for deploying a
honeypot , not a concern. Choice D, the risk that thehoneypot would be subject to a distributed
denial-of-service ( DDoS ) attack, is not relevant, as the honeypot is not a critical device for providing
service.