Multiple Choice
Steve is suspicious that someone in his company is attempting to access folders that are unrelated to their job or projects. His first step is to create groups and solidify permissions to prevent this sort of access. He then creates a folder project called "New Netbook OS Project - Do Not Leak to Media" and places fictitious documents inside of it. He then monitors the gadget sites for information and when he sees something, checks what employee accessed that file.
What has Steve done?
A) Created a "Honeypot"
B) Setup a network "Tar Pit"
C) Configured a "Black Hole Trap"
D) Created a "Honey Token"
Correct Answer:

Verified
Correct Answer:
Verified
Q38: You wish to capture a set of
Q39: Leo wants to secure his wireless network.
Q40: Which of the following tools cannot be
Q41: WPA is vulnerable to brute force if
Q42: Which of the following protocols are not
Q44: Arianna wants to implement 802.11b for a
Q45: Dean is repurposing an old Dell Axim
Q46: Cisco devices use a protocol called CDP
Q47: Jack is worried about the FUD (Fear
Q48: Howard wants to control access to his