Question 482:
Every morning, a systems administrator monitors failed login attempts on the company`s log management server. The administrator notices the DBAdmin account has five failed username and/or password alerts during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?
Answer options:
A. Role-based access control B. Honeypot C. Rule-based access control D. Password cracker