Which of the following is a vulnerable system designed to detect and log unauthorized access?

Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honey pot
C. DMZ
D. Proxy server

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

8 thoughts on “Which of the following is a vulnerable system designed to detect and log unauthorized access?

  1. Because the keyword is “unauthorized”, and knowing what we know about COMPTIAs literal way of thinking about things, B is the correct answer, becau22se honey pots are designed to lure UNAUTHORIZED individuals (i.e. hackers)

          1. Honey pots do not log or detect…The answer is 100% SIEM. It does logging of all system alerts and creates a way of managing it in a user friendly manner. A honey pot is literally just a vulnerable system segregated away from your network for you to analyze attack methodologies. Honey pots by themselves do nothing. You can put SIEM on a honey pot but it will be SIEM that logs and and has advanced threat detection.

    1. Pretty sure SIEM is something you’d use within the honey pot to take care of the detection and logging of unauthorized access. So technically B is correct

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.