Company XYZ has suffered leaks of internally distributed confidential documents. Ann the network
security analyst has been tasked to track down the culprit. She has decided to embed a four letter string
of characters in documents containing proprietary information. Which of the following initial steps should
Ann implement before sending documents?

A.
Store one of the documents in a honey pot
B.
Start antivirus scan on all the suspected computers
C.
Add a signature to the NIDS containing the four letter string
D.
Ask employees to report suspicious behaviors