Steve is suspicious that someone in his company is attempting to access folders that are unrelated to their job or projects. His first step is to create groups and solidify permissions to prevent this sort of access. He then creates a folder project called "New Netbook OS Project - Do Not Leak to Media" and places fictitious documents inside of it. He then monitors the gadget sites for information and when he sees something, checks what employee accessed that file.
What has Steve done?
A) Created a "Honeypot"
B) Setup a network "Tar Pit"
C) Configured a "Black Hole Trap"
D) Created a "Honey Token"
Correct Answer:
Verified
Q48: You wish to capture a set of
Q49: What is the most accurate statement below
Q50: Using Hping, you wish to enumerate the
Q51: During a traceroute, you notice that the
Q52: Curtis works for a small company. His
Q54: Which of the following tools can be
Q55: NIDS operate at layer 2. Raw traffic
Q56: When evaluating possible NIDS, you are concerned
Q57: Jeremy knows that the network has been
Q58: ARP spoofing can be used to perform
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents