Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 199 Topic 20 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 199 Topic 20 Discussion

312-50v13 Exam Topic 20 Question 199 Discussion:
Question #: 199
Topic #: 20

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?


A.

Detecting honeypots running on VMware


B.

Detecting the presence of Honeyd honeypots


C.

Detecting the presence of Snort_inline honeypots


D.

Detecting the presence of Sebek-based honeypots


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.