A security administrator has implemented a series of computers to research possible intrusions into the organizational network, and to determine the motives as
well as the tool used by malicious entities. Which of the following has the security administrator implemented?

A.
Honeypot
B.
DMZ
C.
Honeynet
D.
VLANs