EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
Entrapment: An intruder accessed the honeypot and downloaded information.
Entrapment (Illegal & Unethical)
A setup intentionally encouraged the intruder to commit an act that might not have occurred otherwise.
Occurs when someone is persuaded to commit a crime they had no intention of committing.
Example: A system openly advertises sensitive data and then prosecutes individuals who access it.
Enticement (Legal & Ethical)
Involves making a crime more tempting, but the individual has already decided to commit it.
Example: A honeypot with open ports or services that attackers can exploit.