A security administrator wants to get a real time look at what attackers are doing in the wild,
hoping to lower the risk of zero-day attacks. Which of the following should be used to accomplish
this goal?
A.
Penetration testing
B.
Honeynets
C.
Vulnerability scanning
D.
Baseline reporting