According to theCisco Certified Support Technician (CCST) Cybersecurity Study Guide, a honeypot is asecurity mechanism that appears to be a legitimate system or resource but is intentionally made vulnerable to attract attackers. Its purpose is not to serve legitimate users but to detect, study, and sometimes divert malicious activity.
"A honeypot is a decoy system or service designed to attract and engage attackers. By simulating a target of interest, it allows security teams to monitor attack methods, collect intelligence, and sometimes divert threats away from production systems. Honeypots do not prevent attacks but help in identifying them and understanding adversary tactics."
(CCST Cybersecurity,Basic Network Security Concepts, Honeypots and Honey Nets section, Cisco Networking Academy)
In this context:
Option Adescribes an IDS (Intrusion Detection System), not a honeypot.
Option Crefers to aDMZ (Demilitarized Zone), not a honeypot.
Option Ddescribes an IPS (Intrusion Prevention System).
Option Bcorrectly identifies a honeypot’s role as adecoyto divert or engage attackers.
Submit