C&E
Honeypot attracts and traps attacker and DNS sinkhole redirects malicious domain name queries to a controlled server to detect and block communication between compromised host and their C2 servers.
C. Honeypots and E. DNS sinkhole
Explanation:
Honeypots: These are decoy systems set up to lure attackers and observe their behavior once they've infiltrated the network. They help detect unauthorized activity and gather intelligence about the attack.
DNS sinkhole: This redirects malicious traffic (e.g., communication with command-and-control servers) to a controlled environment, allowing detection of compromised systems within the network.
Other Options:
A. Tokenization: Focuses on replacing sensitive data with tokens for security but doesn’t help in detecting attackers.
B. CI/CD: Refers to Continuous Integration/Continuous Deployment processes, which are unrelated to intrusion detection.
D. Threat modeling: Identifies potential risks during system design but doesn’t detect attackers already in the network.
F. Data obfuscation: Hides sensitive data but does not help with detecting network intrusions.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
a4e15bd
Highly Voted 8 months, 3 weeks agoAnyio
Most Recent 3 months ago