Which of the following typically consists of a computer, some real looking data and/or a network site
that appears to be part of a production network but which is in fact isolated and well prepared?

A.
honeypot
B.
superpot
C.
IDS
D.
IPS
E.
firewall
F.
None of the choices.
Explanation:
You may use a honeypot to detect and deflect unauthorized use of your information systems. A
typical honeypot consists of a computer, some real looking data and/or a network site that appears
to be part of a production network but which is in fact isolated and well prepared for trapping
hackers.