Which of the following acts as a decoy to detect active internet attacks?

A.
Honeypots
B.
Firewalls
C.
Trapdoors
D.
Traffic analysis
Explanation:
Honeypots are computer systems that are expressly set up to attract and trap individuals who attempt to
penetrate other individuals’ computer systems. The concept of a honeypot is to learn from intruder’s actions. A
properly designed and configured honeypot provides data on methods used to attack systems. The data are
then used to improve measures that could curb future attacks. A firewall is basically a preventive measure.
Trapdoors create a vulnerability that provides an opportunity for the insertion of unauthorized code into a
system. Traffic analysis is a type of passive attack.