Allowed the organization capture the attacker tactics and tools
Honeyfile Detects Unauthorized Access Assignment Answers
Question:
A software organization has implemented a deception strategy to detect unauthorized data access attempts. An attacker, believing to have successfully obtained sensitive data, actually accessed a fabricated document designed to look like real sensitive information. This document was monitored, and upon access, it allowed the organization to capture the attacker's tactics and tools. What specific type of deception technology did the organization deploy? Honeynet Honeytoken Honeyfile Honeypot
Honeyfile Detects Unauthorized Access Answer and Explanation
3. Honeytoken: A honeytoken is a specific type of decoy or trap that is used to detect unauthorized access or usage. It can be a piece of data that, when accessed or used, indicates a security incident.
In summary, the organization in your scenario deployed a Honeyfile as part of its deception strategy to detect unauthorized data access attempts.