312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 128


As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

Show Answer
Correct Answer: A

Implementing a brute force attack to verify system vulnerability would not assist in detecting a honeypot because it focuses on exploiting potential weaknesses in the target system rather than identifying whether the system is a honeypot. A brute force attack aims to gain unauthorized access by systematically trying many passwords or keys, and it does not provide information about the nature of the system being attacked.

Discussion

7 comments
Sign in to comment
qwerty100Option: A
Feb 6, 2024

A. Implementing a brute force attack to verify system vulnerability

insaniuntOption: A
Feb 9, 2024

A. Implementing a brute force attack to verify system vulnerability (reference: Module 12 Page 1757 from CEH v12 book)

[Removed]
Feb 10, 2024

Could someone help me confirm the accuracy of this data

calx5Option: C
Feb 15, 2024

C Tools to detect honeypots include Send-safe Honeypot Hunter (http://www.send-safe.com) and kippo_detect (https://github.com).

ryotan
Feb 17, 2024

The question is Which of the following techniques would {NOT} assist in detecting a honeypot”, as the tool helps, hence, it is "NOT" correct.

ryotanOption: A
Feb 17, 2024

brute force attack may be detected by honey pots, so A is the answer.

calx5Option: A
Feb 21, 2024

A, Thanks for reminder.

a307962Option: A
Jul 7, 2024

A. Implementing a brute force attack