Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 712-50 topic 1 question 389 discussion

Actual exam question from ECCouncil's 712-50
Question #: 389
Topic #: 1
[All 712-50 Questions]

Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?

  • A. Segmentation controls.
  • B. Shadow applications.
  • C. Deception technology.
  • D. Vulnerability management.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Emporeo
4 days, 13 hours ago
Selected Answer: C
deception tech
upvoted 1 times
...
skaf
6 months ago
Selected Answer: C
Deception technology
upvoted 1 times
...
arifbhatkar
8 months, 3 weeks ago
Selected Answer: C
The correct answer is C. Deception technology. Deception technology is used to lure attackers into false environments or decoy systems. These decoy systems are designed to mimic the appearance and behavior of real systems, applications, or data, with the purpose of attracting attackers and diverting their attention away from actual critical systems. Deception technology can include decoy servers, fake network segments, or deceptive data files.
upvoted 1 times
...
VOAKDO_cciso
10 months ago
Selected Answer: C
HONEY POT: DECEPTION APP
upvoted 1 times
...
Pika26
1 year ago
Answer is C.
upvoted 2 times
...
vernfwx
1 year, 8 months ago
Selected Answer: C
C instead
upvoted 2 times
...
arifbhatkar
1 year, 8 months ago
Correct answer is C
upvoted 2 times
...
Otto_Aulicino
2 years, 3 months ago
C is the answer. Even the previous question is the same question, written slightly differently.
upvoted 2 times
...
ahmad_Hammad
2 years, 11 months ago
It’s C not B
upvoted 1 times
...
e_karma
3 years, 1 month ago
It is not B, Shadow application means the applications run by other business units without explicit permission of the IT department. The answer should be Deception technology . eg Honey pot is a type of deception technology
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...