Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-50v12 All Questions
Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

ECCouncil CEH v12 312-50v12 Question # 65 Topic 8 Discussion

312-50v12 Exam Topic 8 Question 65 Discussion:
Question #: 65
Topic #: 8

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?


A.

Detecting honeypots running on VMware


B.

Detecting the presence of Honeyd honeypots


C.

Detecting the presence of Snort_inline honeypots


D.

Detecting the presence of Sebek-based honeypots


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.