Company XYZ has suffered leaks of internally distributed confidential documents. Ann the network security
analyst has been tasked to track down the culprit. She has decided to embed a four letter string of characters in
documents containing proprietary information. Which of the following initial steps should Ann implement before
sending documents?
A.
Store one of the documents in a honey pot
B.
Start antivirus scan on all the suspected computers
C.
Add a signature to the NIDS containing the four letter string
D.
Ask employees to report suspicious behaviors