Answer:
There are four options for these questions: and d is correct answer
a. signature
b. priority file
c. moles
d. honeytoken
Step-by-step explanation:
Honeytokens are words or fictitious records implemented in a database, with this option we can track data in a complex situation, for example, in cloud computing, if someone tries to steal data from the database we can detect, who was the thief, and we can add a honeytoken in every record of our database.