
cu_quiz_honeypot_1
Authored by Michal Studenny
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a honeypot in cybersecurity?
A type of malware
A security tool used to attract attackers
A firewall
A type of antivirus
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a primary purpose of a honeypot?
To block all incoming network traffic
To deceive attackers and collect threat intelligence
To scan networks for vulnerabilities
To replace a firewall
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
True or False: A honeypot should contain real sensitive data
True
False
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these is NOT a type of honeypot?
Low-interaction honeypot
Medium-interaction honeypot
High-interaction honeypot
Advanced Persistent Threat honeypot
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which tool is commonly used to deploy honeypots?
Wireshark
Metasploit
Cowrie
Kali Linux
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following can be detected using a honeypot?
Unauthorized access attempts
New malware samples
Attack techniques and tools
All of the above
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which honeypot tool is designed to emulate SSH and capture brute-force attacks?
Cowrie
Nmap
Kali Linux
OSINT
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?