In order to gain an understanding of the latest attack tools being used in the wild, an administrator puts a Unix server on the network with the root users password to set root. Which of the following best describes this technique?
A. Pharming
B. Honeypot
C. Gray box testing
D. phishing
Answer: B. Honeypot
You might also like to view...
To limit the amount of text on a slide, the textbook recommends that you follow the 8 x 8 guideline
Indicate whether the statement is true or false
A(n) __________ hacks the public telephone network to make free calls or disrupt services.
Fill in the blank(s) with the appropriate word(s).
Which VLSM subnets will overlap? (2 answers)
A) 60.146.128.0/18 B) 60.146.64.0/18 C) 60.146.0.0/17 D) 60.146.192.0/18 E) None
In the following pseudocode, the value for TRANSCODE is an example of a(n)?
``` Start Read TRANSCODE CASENTRY TRANSCODE CASE “Receipt” Process B000 CASE “Order” Process B010 CASE “Withdrawal” Process B020 CASE “Adjustment” Process B030 ENDCASE Write GRADE Stop ``` a) character string b) character-string constant c) alphabetic variable d) both a and b