Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?
A) Entrapment
B) Enticement
C) Intruding into a honeypot is not illegal
D) Intruding into a DMZ is not illegal
Correct Answer:
Verified
Q559: An "idle" system is also referred to
Q560: John and Hillary works at the same
Q561: On Linux/Unix based Web servers, what privilege
Q562: What will the following URL produce in
Q563: You have compromised a lower-level administrator account
Q565: Why are Linux/Unix based computers better to
Q566: Terri works for a security consulting firm
Q567: When setting up a wireless network with
Q568: What is kept in the following directory?
Q569: You work as a penetration tester for
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents