312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 297


Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.

Which of the following techniques is employed by Dayn to detect honeypots?

Show Answer
Correct Answer: C

Dayn used a time-based TCP fingerprinting method to differentiate between the response times of a normal computer and a honeypot to a SYN request. This technique is employed to detect the presence of Honeyd honeypots, as Honeyd emulates network stacks and can often be identified by their unique timing responses to network queries.

Discussion

3 comments
Sign in to comment
insaniuntOption: C
Feb 25, 2024

C. Detecting the presence of Honeyd honeypots

LordXanderOption: C
Apr 3, 2024

CEHv12 - 1760 / 1759

sunce12Option: C
Jun 21, 2024

C. Detecting the presence of Honeyd honeypots