Which of the following may be deployed in a network as lower cost surveillance and early-warning tools?

A.
Honeypots
B.
Hardware IPSs
C.
Hardware IDSs
D.
Botnets
E.
Stateful inspection firewalls
F.
Stateful logging facilities
G.
None of the choices.
Explanation:
Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance
and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources
are studied during and after an attack to keep an eye on new exploitation techniques.