Which of the following may be deployed in a network as lower cost surveillance and early- warning
Stateful inspection firewalls
Stateful logging facilities
None of the choices.
Honeypots, essentially decoy network-accessible resources, could be deployed in a network as
surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise
these decoy resources are studied during and after an attack to keep an eye on new exploitation