exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 237 discussion

Actual exam question from ISC's CISSP
Question #: 237
Topic #: 1
[All CISSP Questions]

The security organization is looking for a solution that could help them determine with a strong level of confidence that attackers have breached their network.
Which solution is MOST effective at discovering a successful network breach?

  • A. Developing a sandbox
  • B. Installing an intrusion detection system (IDS)
  • C. Deploying a honeypot
  • D. Installing an intrusion prevention system (IPS)
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AJohn1
Highly Voted 2 years, 8 months ago
Selected Answer: C
IDS can give a false positive alert, hence not always the strongest evidence of intrusion. Any intrusion on the honeypot is a strong evidence of intrusion. Also, IDS can be deployed to detect the intrusion on honeypot
upvoted 12 times
jackdryan
2 years, 1 month ago
C is correct
upvoted 1 times
...
homeysl
1 year, 8 months ago
So you're saying that IDS is the tool to detect intrusion because it can also be deployed in the honeypot?
upvoted 3 times
...
...
sec_007
Highly Voted 2 years, 8 months ago
Selected Answer: B
B is correct. Honeypots - Honeypot gives administrators an opportunity to observe an attacker’s activity without compromising the live environment. In some cases, the honeypot is designed to delay an intruder long enough for the automated IDS to detect the intrusion and gather as much information about the intruder as possible. IDS is for confirming the detection, honeypot is just to observe and learn or give a false impression of system vulnerability/divert the efforts of attacker.
upvoted 10 times
...
djedwards
Most Recent 1 week, 5 days ago
Selected Answer: B
The question asks "Most Effective" so I will go with B.
upvoted 1 times
...
bassfunk
3 weeks, 3 days ago
Selected Answer: B
Even if they breach the network, they don't have to fall for the honeypot. I'd go with B.
upvoted 1 times
...
HarkonMoseley
1 month, 1 week ago
Selected Answer: B
the question says "successful network breach" the honeypot can be left untouched and my network breached. by other side, IDS will see the patterns on traffic and notice the breach
upvoted 1 times
...
BigITGuy
3 months ago
Selected Answer: C
A honeypot is a decoy system intentionally designed to attract attackers by simulating vulnerable services or assets. IDS helps detect known attack patterns and anomalies but can generate false positives and may not detect low-and-slow intrusions.
upvoted 1 times
...
Maggieeeee
5 months, 3 weeks ago
Selected Answer: C
The keyword here is "successful", which means the attack has happened.
upvoted 1 times
...
stack120566
6 months, 4 weeks ago
Selected Answer: B
Are we suggesting that HoneyPots should be deployed to procution networks. if the Honeypot is properly set up on a non prodcution network , would this scenario be a sucessful network breech or a sucessful diversion and delay of the attacker. A sucessful network attack against a honey pot is like a sucessful carjacking of a car with no gas. Furthermore , the Honeypot is pretty much useless without an IDS.
upvoted 1 times
...
CCNPWILL
1 year, 1 month ago
Selected Answer: C
C can tell you if a breach has possibly occured. Malware making its way to the honeypot server tells you it bypassed the 2 other 2 best answers... IDS and IPS. C is correct.
upvoted 1 times
...
TheManiac
1 year, 1 month ago
Selected Answer: C
with a strong level of confidence = honeypot. No one else would access it.
upvoted 1 times
...
Yokota
1 year, 1 month ago
Selected Answer: B
A honeypot is not on the same network; therefore, there is no strong level of confidence that the network has been breached. This is what the question is asking
upvoted 2 times
...
sbear123
1 year, 3 months ago
Selected Answer: B
IDS = MOST effective at discovering a successful network breach. IDS will provide evidence of breach. Honeypot = to entice the attackers. It does not mean that network is breached.
upvoted 1 times
...
[Removed]
1 year, 4 months ago
Selected Answer: C
IF IDS was the answer, IPS is just as good so its the Honeypot
upvoted 2 times
...
Soleandheel
1 year, 6 months ago
C. Deploying a honeypot A honeypot is a security mechanism that is intentionally set up to mimic a target system or network, designed to lure attackers. When an attacker breaches a honeypot, it is a strong indicator that a network breach has occurred because there is no legitimate reason for anyone to access the honeypot system or network. Honeypots are designed to be highly monitored and have no legitimate traffic, so any activity in them is suspicious. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) primarily focus on detecting and preventing known attacks or suspicious traffic patterns, and they may not always provide the same level of confidence in identifying a successful breach as honeypots do.
upvoted 2 times
...
dekoren
1 year, 7 months ago
Selected Answer: B
IDS is a system primarily for the detection of network threats. I would say that IDS makes more sense than a honeypot.
upvoted 1 times
...
homeysl
1 year, 8 months ago
Selected Answer: B
B is my answer. Attackers already breached the network, honeypot is useless at that point.
upvoted 3 times
...
rsantunes
1 year, 8 months ago
Selected Answer: B
The question says that the attackers have already breached the network, so they are already established and not necessarily will move to the honeypot. Analysing network traffic with an IDS might be the best option for this case.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...