CompTIA Exam Questions

Which of the following best describes this technique?

In order to gain an understanding of the latest attack tools being used in the wild, an administrator puts a Unix
server on the network with the root user’s password to set root. Which of the following best describes this
technique?

A.
Pharming

B.
Honeypot

C.
Gray box testing

D.
phishing