Learn when honeypots and honeynets make sense and what they are meant to observe or divert.
Deception-technology questions are purpose questions. CompTIA is usually testing whether you understand that honeypots and honeynets are there to observe, misdirect, and study attacker behavior, not to replace normal prevention and segmentation.
Honeynet: A more extensive decoy environment built to study attacker behavior across multiple systems.
Honeypot: A decoy system or service intended to attract, detect, or study malicious behavior.
Sinkhole: A destination used to redirect unwanted or malicious traffic so it can be contained or observed more safely.
The strongest answers usually separate:
| Deception control | Strongest value |
|---|---|
| honeypot | attract and observe suspicious interaction with a decoy service or host |
| honeynet | observe attacker behavior across a broader decoy environment |
| sinkhole | redirect unwanted traffic away from more valuable assets |
flowchart LR
A["Suspicious probe or attack path"] --> B["Decoy or redirect target"]
B --> C["Monitoring and analysis"]
C --> D["Improve detection or response"]
What to notice:
1Public decoy SSH service
2- isolated from production servers
3- monitored for login attempts
4- sends alerts on new attacker behavior
What to notice:
Continue with 4.4 Risk, Vulnerability, Exploit & CIA to keep the domain flow intact.