GK Question

technology hard true_false

Deception technology uses honeypots and decoys to detect and study attacker behavior.

  1. True
  2. False

Answer: True

Deception technology deploys realistic fake assets (servers, credentials, data) to lure attackers, enabling early detection, threat intelligence, and reduced dwell time. Complements prevention/detection controls. Used in enterprise security and critical infrastructure protection. Important for advanced cybersecurity questions.

Topic Advanced Cybersecurity
Exam Relevance Banking, UPSC, SSC