Which of the following will Mark use to attract the attackers for understanding their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Mark is concerned about probable attackers will be able to
penetrate the VPN. Which of the following will Mark use to attract the attackers for understanding
their methods?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Mark is concerned about probable attackers will be able to
penetrate the VPN. Which of the following will Mark use to attract the attackers for understanding
their methods?

A.
CIA Triangle

B.
Attack surface

C.
Honeypot

D.
Social engineering

Explanation:
In the above scenario, to attract the attackers for understating their strategy, Mark can create a
honeypot outside the perimeter network that is a erroneous program that can try to be like a VPN or
service.



Leave a Reply 0

Your email address will not be published. Required fields are marked *