Last Updated on August 13, 2021 by Admin 2
Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?
- High interaction honeypots
- Research honeypot
- Low interaction honeypots
- Pure honeypots