____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. Select one: a. Log file monitors b. Honeypots c. Trap and trace systems d. Packet exchangers

Respuesta :

Answer:

B. Honeypots

Explanation:

Honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Honeypots are designed to purposely engage and deceive hackers and identify malicious activities performed over the Internet by the hackers. Multiple honeypots can be set on a network to form a honeynet.