Which of the following may be deployed in a network as lower cost surveillance and early- warning
tools?

A.
Honeypots
B.
Hardware IPSs
C.
Hardware IDSs
D.
Botnets
E.
Stateful inspection firewalls
F.
Stateful logging facilities
G.
None of the choices.
Explanation:
Honeypots, essentially decoy network-accessible resources, could be deployed in a network as
surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise
these decoy resources are studied during and after an attack to keep an eye on new exploitation
techniques.