An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the business operation. Which of the following should the analyst implement?
A.
Honeypot
B.
Jump box
C.
Sandboxing
D.
Virtualization
Explanation: