Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSS Topic 6 Question 39 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 39
Topic #: 6
[All ECSS Questions]

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.

Which system is John using to track the malicious hackers?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/500 words
Maryrose
12 days ago
A decoy system? Sounds too good to be true!
upvoted 0 times
...
Deeann
17 days ago
Honeypots are super effective, but they can be risky.
upvoted 0 times
...
Denna
23 days ago
Wait, are we sure it's not an IDS? Seems like it could fit too.
upvoted 0 times
...
Shayne
28 days ago
Agreed, honeypots are the way to go for tracking hackers.
upvoted 0 times
...
Vilma
1 month ago
That's definitely a honeypot!
upvoted 0 times
...
Stefania
1 month ago
I feel like an Intrusion Detection System might not be the right answer here, since it doesn't really trick hackers like a honeypot does.
upvoted 0 times
...
Nickole
1 month ago
I'm not entirely sure, but I remember something about honeytokens being used for tracking too. Could it be that?
upvoted 0 times
...
Dylan
1 month ago
I think John is using a honeypot since it's designed to lure in hackers and monitor their activities.
upvoted 0 times
...
Ceola
1 month ago
I practiced a similar question, and I believe a bastion host is more about securing access rather than tracking hackers.
upvoted 0 times
...
Elin
1 month ago
Okay, the key here is that the question is asking about aspects determined by the time policy, not just any aspects of the promotion. I'll go with A and B.
upvoted 0 times
...
Johnetta
1 month ago
Hmm, I'm a bit confused by the read-only and read-write access requirements. I'll need to double-check the ZFS properties to make sure I understand how to set that up.
upvoted 0 times
...
Adela
1 month ago
This is a good test of our understanding of the Scrum framework. I'll use the process of elimination to narrow it down.
upvoted 0 times
...
Portia
2 months ago
Okay, I've got this. After the initial implementation of IT governance, the next logical step is to start measuring the objectives and key performance indicators to see if the governance program is effective. I'm confident that's the right answer.
upvoted 0 times
...

Save Cancel