When the IDS detect attackers, the attackers are seamlessly transferred to a special host. This
method is called:

A.
Vulnerability Analysis Systems
B.
Padded Cell
C.
Honey Pot
D.
File Integrity Checker
Explanation:
Padded cells take a different approach. Instead of trying to attract attackers with tempting data, a
padded cell operates in tandem with traditional IDS. When the IDS detect attackers, it seamlessly
transfers then to a special padded cell host.