A cybersecurity technician sets up a honeypot within a separate DMZ of the enterprise network. What is the purpose of doing this?
- to set up an audit trail of threat actors who access the platform
- to gather virus signatures so that antivirus signature database can be updated
- to gather malware signatures so that they can patch the attack surface
- to attract threat actors in order to gather attack-related information that can then be shared with threat intelligence platform subscribers
Explanation & Hint:
Honeypots are simulated networks or servers that are designed to attract threat actors in order to gather attack-related information that can then be shared with threat intelligence platform subscribers. |