The security team would like to gather intelligence about the types of attacks being launched
against the organization. Which of the following would provide them with the MOST information?
A.
Implement a honeynet
B.
Perform a penetration test
C.
Examine firewall logs
D.
Deploy an IDS