Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honey pot
C. DMZ
D. Proxy server
Exam N10-008: CompTIA Network+Free dumps for N10-008 in PDF format.High quality N10-008 PDF and software. VALID exam to help you pass. |
Because the keyword is “unauthorized”, and knowing what we know about COMPTIAs literal way of thinking about things, B is the correct answer, becau22se honey pots are designed to lure UNAUTHORIZED individuals (i.e. hackers)
Because It says ” A vulnerable system”, I think B is the best choice
Answer should be A no?
bitch shut up
Answer could be A and B, I’d lean more towards A.
The Q said that it designed to detect .. so it’s more B that A
Honey pots do not log or detect…The answer is 100% SIEM. It does logging of all system alerts and creates a way of managing it in a user friendly manner. A honey pot is literally just a vulnerable system segregated away from your network for you to analyze attack methodologies. Honey pots by themselves do nothing. You can put SIEM on a honey pot but it will be SIEM that logs and and has advanced threat detection.
Pretty sure SIEM is something you’d use within the honey pot to take care of the detection and logging of unauthorized access. So technically B is correct