A client is concerned about a hacker compromising a network in order to gain access to confidential research data.
Which of the following could be implemented to redirect any attackers on the network?
A.
DMZ
B.
Content Filter
C.
Botnet
D.
Honeypot