113k views
2 votes
What might an administrator use to try to catch an insider attempting to access confidential information on the company servers?

1 Answer

2 votes

Answer:

There are four options for these questions: and d is correct answer

a. signature

b. priority file

c. moles

d. honeytoken

Step-by-step explanation:

Honeytokens are words or fictitious records implemented in a database, with this option we can track data in a complex situation, for example, in cloud computing, if someone tries to steal data from the database we can detect, who was the thief, and we can add a honeytoken in every record of our database.

User Pichsenmeister
by
5.6k points