222k views
4 votes
____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. Select one: a. Log file monitors b. Honeypots c. Trap and trace systems d. Packet exchangers

1 Answer

5 votes

Answer:

B. Honeypots

Step-by-step explanation:

Honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Honeypots are designed to purposely engage and deceive hackers and identify malicious activities performed over the Internet by the hackers. Multiple honeypots can be set on a network to form a honeynet.

User Isadora
by
7.2k points