Company XYZ has suffered leaks of internally distributed confidential documents. Ann the network
security analyst has been tasked to track down the culprit. She has decided to embed a four letter
string of characters in documents containing proprietary information. Which of the following initial
steps should Ann implement before sending documents?
A.
Store one of the documents in a honey pot
B.
Start antivirus scan on all the suspected computers
C.
Add a signature to the NIDS containing the four letter string
D.
Ask employees to report suspicious behaviors