In order to gain an understanding of the latest attack tools being used in the wild, an administrator puts a Unix server on the network with the root users password to set root. Which of the following best describes this technique?

A. Pharming
B. Honeypot
C. Gray box testing
D. phishing


Answer: B. Honeypot

Computer Science & Information Technology

You might also like to view...

To limit the amount of text on a slide, the textbook recommends that you follow the 8 x 8 guideline

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) __________ hacks the public telephone network to make free calls or disrupt services.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which VLSM subnets will overlap? (2 answers)

A) 60.146.128.0/18 B) 60.146.64.0/18 C) 60.146.0.0/17 D) 60.146.192.0/18 E) None

Computer Science & Information Technology

In the following pseudocode, the value for TRANSCODE is an example of a(n)?

``` Start Read TRANSCODE CASENTRY TRANSCODE CASE “Receipt” Process B000 CASE “Order” Process B010 CASE “Withdrawal” Process B020 CASE “Adjustment” Process B030 ENDCASE Write GRADE Stop ``` a) character string b) character-string constant c) alphabetic variable d) both a and b

Computer Science & Information Technology