EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 121
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
Entrapment: An intruder accessed the honeypot and downloaded information.
Entrapment (Illegal & Unethical)
A setup intentionally encouraged the intruder to commit an act that might not have occurred otherwise.
Occurs when someone is persuaded to commit a crime they had no intention of committing.
Example: A system openly advertises sensitive data and then prosecutes individuals who access it.
Enticement (Legal & Ethical)
Involves making a crime more tempting, but the individual has already decided to commit it.
Example: A honeypot with open ports or services that attackers can exploit.