ECCouncil Exam Questions

Why will this not be viable?

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his
production network. In this honeypot, he has placed a server running Windows Active Directory. He has also
placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download
sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder
accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the
intruder for stealing sensitive corporate information. Why will this not be viable?

A.
Entrapment

B.
Enticement

C.
Intruding into a honeypot is not illegal

D.
Intruding into a DMZ is not illegal