Honeypots for Database Attack Detection

What is the main objective of implementing a database honeypot in this experiment?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What is the purpose of creating decoy tables such as `users_decoy` and `credit_cards_decoy`?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which of the following SQL operations on a decoy table is considered suspicious?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What type of information is stored when suspicious activity is detected?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Which security concept is demonstrated by the use of a database honeypot?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Why is the honeypot database not used as a production system?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation