Which of the following describes a single computer that is setup specifically to lure hackers into
revealing their methods, and preventing real attacks on the production network?
A.
Evil twin
B.
Honeypot
C.
DMZ
D.
Honeynet
Explanation:
In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract
attempts at unauthorized use of information systems.