exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 306 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 306
Topic #: 1
[All 312-50v11 Questions]

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.
Which of the following techniques is employed by Dayn to detect honeypots?

  • A. Detecting honeypots running on VMware
  • B. Detecting the presence of Snort_inline honeypots
  • C. Detecting the presence of Honeyd honeypots
  • D. Detecting the presence of Sebek-based honeypots
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mimshack
Highly Voted 1 year, 9 months ago
C indeed is the answer: CEH book page 1600 - Evading IDS, Firewalls, and Honeypots. And oh, this question was present in the actual exam.
upvoted 24 times
...
beowolf
Highly Voted 1 year, 9 months ago
C is the answer. An attacker can identify the presence of a honeyd honeypot by performing time-based TCP fingerprinting method (SYN proxy behavior)
upvoted 10 times
...
Daniel8660
Most Recent 8 months, 2 weeks ago
Selected Answer: C
Detecting Honeypots Detecting and Defeating Honeypots - Detecting the presence of Honeyd Honeypot Honeyd is a widely used honeypot daemon.This honeyd honeypot can respond to a remote attacker who tries to contact the SMTP service with fake responses. An attacker can identify the presence of honeyd honeypot by performing time-based TCP fingerprinting methods (SYN proxy behavior). (P.1601/5885)
upvoted 2 times
...
MMtc
11 months, 3 weeks ago
Selected Answer: C
Detecting Honeypots running on VMware: Observe the IEEE standards for the current range of MAC addresses assigned to VMWare Inc Detecting the presence of Snort_inline Honeypot: Analyze the outgoing packets by capturing the Snort_inline modified packets through another host system and identifying the packet modification Detecting the presence of Honeyd Honeypot: Perform time-based TCP Finger printing methods (SYN Proxy behavior) Detecting the presence of Sebek-based Honeypots: Sebek logs everything that is accessed via read() before transferring it to the network, causing the congestion effect. Analyze the congestion in the network layer
upvoted 3 times
...
stettin12
1 year, 3 months ago
Selected Answer: C
See https://www.linkedin.com/pulse/honeypots-types-technologies-detection-techniques-tools-ahmed-eissa
upvoted 1 times
...
Jong1
1 year, 3 months ago
Selected Answer: C
An attacker can identify the presence of honeyd honeypot by performing time-based TCP fingerprinting methods (SYN proxy behavior).
upvoted 1 times
...
APOLLO1113
1 year, 4 months ago
Selected Answer: C
Is Honeyd as it says TCP fingerprinting
upvoted 2 times
...
mrhaky
1 year, 5 months ago
Selected Answer: C
An attacker can identify the presence of a honeyd honeypot by performing time-based TCP fingerprinting method (S
upvoted 2 times
...
Jasonxxx
1 year, 6 months ago
Selected Answer: C
C indeed is the answer: CEH book page 1600
upvoted 2 times
...
Jaak
1 year, 6 months ago
Selected Answer: C
C indeed is the answer: CEH book page 1600
upvoted 2 times
...
Unitel21
1 year, 7 months ago
C is the correct answer.
upvoted 1 times
...
Sam_Fyl
1 year, 8 months ago
B is unlikely the answer. B- Attackers can identify these honeypots by analyzing the outgoing packets. If an outgoing packet is dropped, it might look like a black hole to an attacker, and when the snort_inline modifies an outgoing packet, the attacker can capture the modified packet through another host system and identify the packet modification.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...