Which of the following acts as a decoy to detect active internet attacks?
A.
Honeypots
B.
Firewalls
C.
Trapdoors
D.
Traffic analysis
Explanation:
Honeypots are computer systems that are expressly set up to attract and trap individuals who
attempt to penetrate other individuals’ computer systems. The concept of a honeypot is to learn
from intruder’s actions. A properly designed and configured honeypot provides data on methods
used to attack systems. The data are then used to improve measures that could curb future attacks.
A firewall is basically a preventive measure. Trapdoors create a vulnerability that provides an
opportunity for the insertion of unauthorized code into a system. Traffic analysis is a type of passive
attack.