Which of the following acts as a decoy to detect active internet attacks?

A.
Honeypots
B.
Firewalls
C.
Trapdoors
D.
Traffic analysis
Explanation:
Honeypots are computer systems that are expressly set up to attract and trap individuals who
attempt to penetrate other individuals’ computer systems. The concept of a honeypot is to learn
from intruder’s actions. A properly designed and configured honeypot provides data on methods
used to attack systems. The data are then used to improve measures that could curb future
attacks. A firewall is basically a preventive measure. Trapdoors create a vulnerability that provides
an opportunity for the insertion of unauthorized code into a system. Traffic analysis is a type of
passive attack.