SY0-701 · Question #513
SY0-701 Question #513: Real Exam Question with Answer & Explanation
The correct answer is A: Creating a false text file in /docs/salaries. A file with a name like "salaries" suggests sensitive information, which would likely draw the attention of an insider threat looking for valuable or confidential data. This technique is often used as part of a honeypot strategy to monitor and detect suspicious activity by inside
Question
Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?
Options
- ACreating a false text file in /docs/salaries
- BSetting weak passwords in /etc/shadow
- CScheduling vulnerable jobs in /etc/crontab
- DAdding a fake account to /etc/passwd
Explanation
A file with a name like "salaries" suggests sensitive information, which would likely draw the attention of an insider threat looking for valuable or confidential data. This technique is often used as part of a honeypot strategy to monitor and detect suspicious activity by insiders attempting unauthorized access.
Community Discussion
No community discussion yet for this question.