exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 527 discussion

Actual exam question from CompTIA's SY0-701
Question #: 527
Topic #: 1
[All SY0-701 Questions]

A security analyst created a fake account and saved the password in a non-readily accessible directory in a spreadsheet. An alert was also configured to notify the security team if the spreadsheet is opened. Which of the following best describes the deception method being deployed?

  • A. Honeypot
  • B. Honeyfile
  • C. Honeytoken
  • D. Honeynet
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
squishy_fishy
2 weeks, 1 day ago
Selected Answer: B
GPT: The correct answer is: ✅ B. Honeyfile Explanation: A honeyfile is a decoy file that appears valuable (e.g., contains credentials, financial data, or sensitive information). It is placed in a monitored location to detect unauthorized access. In this case: The analyst saved a fake account and password in a spreadsheet. The spreadsheet is stored in a non-obvious directory. An alert triggers when it's opened. These are textbook characteristics of a honeyfile. ❌ Why the other options are incorrect: Option Why it's not correct A. Honeypot A decoy system or server, not a file. C. Honeytoken A piece of fake data (e.g., fake credential or ID) — similar, but not specifically a file-based trap. D. Honeynet A network of honeypots, much broader in scope.
upvoted 1 times
...
Burnboy
2 weeks, 3 days ago
Selected Answer: B
The account is a honeytoken but the file is a honeyfile. Since the trigger is off of a file, the answer is honeyfile.
upvoted 2 times
...
Teliyah21
1 month, 1 week ago
Selected Answer: B
B it is a honey file
upvoted 3 times
...
drew81
1 month, 1 week ago
Selected Answer: C
Honeytoken refers to any decoy data or token inserted into a system (fake user account, data base record, or any other type of digital bait. When interacted with, indicates a compromise or unauthorized access.
upvoted 2 times
...
Commando9800
1 month, 3 weeks ago
Selected Answer: B
The trigger happens when the spreadsheet is opened, so its a Honeyfile
upvoted 3 times
...
test_arrow
2 months, 3 weeks ago
Selected Answer: C
C. Honeytoken Explanation: ✔ A honeytoken is a decoy piece of data (e.g., fake credentials, database records, or files) designed to detect unauthorized access. ✔ In this scenario, the analyst created a fake account (credentials) and stored them in a hidden spreadsheet, setting up an alert when accessed. ✔ This helps identify malicious activity if an attacker discovers and attempts to use the credentials. Why not the other options? A. Honeypot – A decoy system or server designed to lure attackers, not a single credential or file. B. Honeyfile – A fake document (e.g., a sensitive-looking spreadsheet or PDF), whereas this scenario is about credentials rather than just a document. D. Honeynet – A network of multiple honeypots, not a single deception mechanism like a honeytoken.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago