A business-partner of IBM, specializing in security products, is interested in setting up a specific
system configured to simulate a few common network services. They want to intentionally leave it
exposed to the external network access, in order to attract would-be attackers and study their
attack patterns. Which term is used to denote such a system?

A.
Proxy
B.
Honey pot
C.
Web server
D.
Bastion host