Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-49v9 All Questions
Exam 312-49v9 All Questions

View all questions & answers for the 312-49v9 exam

ECCouncil CHFIv9 312-49v9 Question # 89 Topic 10 Discussion

312-49v9 Exam Topic 10 Question 89 Discussion:
Question #: 89
Topic #: 10

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?


A.

Entrapment


B.

Enticement


C.

Intruding into a honeypot is not illegal


D.

Intruding into a DMZ is not illegal


Get Premium 312-49v9 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.