A company wants to deploy decoy systems alongside production systems in order to entice threat actors and to
learn more about attackers. Which of the following best describes these systems?
A. DNS sinkholes
B. Honeypots
C. Virtual machines
D. Neural networks
learn more about attackers. Which of the following best describes these systems?
A. DNS sinkholes
B. Honeypots
C. Virtual machines
D. Neural networks