CompTIA Exam Questions

Which of the following best describes this technique?

In order to gain an understanding of the latest attack tools being used in the wild, an administrator
puts a Unix server on the network with the root users password to set root. Which of the following
best describes this technique?

A.
Pharming

B.
Honeypot

C.
Gray box testing

D.
phishing