Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?
A. Botnet
B. Intrusion detection system
C. Firewall
D. Honeypot
A. Botnet
B. Intrusion detection system
C. Firewall
D. Honeypot