Which of the following types of technologies is used by security and research personnel for
identification and analysis of new security threats in a networked environment by using false
data/hosts for information collection?

A.
Honeynet
B.
Vulnerability scanner
C.
Port scanner
D.
Protocol analyzer