exam questions

Exam 312-49 All Questions

View all questions & answers for the 312-49 exam

Exam 312-49 topic 1 question 24 discussion

Actual exam question from ECCouncil's 312-49
Question #: 24
Topic #: 1
[All 312-49 Questions]

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

  • A. Use a system that has a dynamic addressing on the network
  • B. Use a system that is not directly interacting with the router
  • C. Use it on a system in an external DMZ in front of the firewall
  • D. It doesn't matter as all replies are faked
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ceh2024
3 months, 1 week ago
Selected Answer: D
If the honeypot is in front of firewall then logical thinking it's safe but too obvious. The threat actor is not a silly guy :-). So look like D is better answer.
upvoted 1 times
...
Ariel235788
1 year, 11 months ago
Selected Answer: D
I say D just for the fact of; if I were a threat actor and I see an externally facing resource, I'm going to assume its a honeypot and not interact with it. If it says its a DC or something and inside were files like "important" or "top-secret" its pretty easy to deduce that this isnt worth my time infiltrating most likely and any interaction I have on pulling files would be flagged and I would immediately be identified. My best bet would be to continue enumerating and seeking out POCs for lateral movement. D just makes more sense as you could deploy externally facing honeypots and internal honeypots to catch threats inside the wire
upvoted 1 times
...
ferari5
2 years, 3 months ago
The idea of honey pot is to learn all attack can be launched against a network externally,to get accurate result place it in front of a firewall.
upvoted 2 times
...
Bodescu
2 years, 7 months ago
As long as the intention is to honeypot some critical servers, D is correct: You will deploy a honeypot in the same datacenter as you have your SQL database. Will deploy too on the same place you have your Apache2 running, and probably you will deploy a honeypot on the same net segment you have an DC running. Cause idea is, to emulate any system you want, really does not matter where to deploy: All is fake
upvoted 2 times
ech
2 years ago
It depends on how you plan to use a honeypot. If we want to discover attack types against our network (which why we use honeypot) then C is correct. If we want to use it as a deception system. Then D is correct. But generally all the responses are fake on the honeypot so I may go with D for this question.
upvoted 2 times
...
...
JKCY
2 years, 10 months ago
C should be the answer..
upvoted 1 times
...
haymaths
4 years, 3 months ago
I support C too but I have seen it some where as D. I was suprised too
upvoted 3 times
...
Pet
4 years, 6 months ago
Answer shd be C
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago