91.6k views
3 votes
____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation.

1 Answer

2 votes

Answer:

Honeypots.

Step-by-step explanation:

Honeypot:- It is a system that is attached to the network it sets itself up as a decoy to tempt cyber attackers and to deflect,detect attempts in an attempt to have unauthorized access to the systems.

It's function is to show itself as a target for attackers on the internet and to collect details and inform the defenders of any efforts to access honeypot by an unauthorized user.

So we conclude that honeypot is the answer.

User Mike Lane
by
6.1k points