192,229 views
23 votes
23 votes
Zenith Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?

A. Metasploit
B. Honeypot
C. Nessus
D. Nmap

User Lihao
by
2.6k points

1 Answer

22 votes
22 votes

Answer:

B. Honeypot

Step-by-step explanation:

Honepots, like the name suggest, are sort of baits for the hackers. Honeypot pretty much decoys made to mimic the actual company computers. Hackers fall for it and think they hit jackpot. Once hackers try to extract info from the honeypot, the security analyst can either track the hackers to report to authorities or this is a way to distract hackers from the real protected data.

User Rob Anderson
by
3.1k points