ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 180 - 312-49v10 discussion

Report
Export

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory.

He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

A.
Entrapment
Answers
A.
Entrapment
B.
Enticement
Answers
B.
Enticement
C.
Intruding into a honeypot is not illegal
Answers
C.
Intruding into a honeypot is not illegal
D.
Intruding into a DMZ is not illegal
Answers
D.
Intruding into a DMZ is not illegal
Suggested answer: A
asked 18/09/2024
Tuukka Valkeasuo
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first