CompTIA Exam Questions

Which of the following best describes this technique?

In order to gain an understanding of the latest attack tools being used in the wild, an administrator puts a
Unix server on the network with the root users password to set root. Which of the following best
describes this technique?

A.
Pharming

B.
Honeypot

C.
Gray box testing

D.
phishing