CompTIA Security+ SY0-701 Practice Question
An organization wants to detect unauthorized attempts to access their sensitive data. They decide to embed uniquely crafted bait elements within their data repositories that will trigger alerts when interacted with. Which of the following deception technologies would BEST achieve this objective?
Using honeytokens
Setting up a honeynet
Implementing honeyfiles
Deploying a honeypot