What is known as decoy system designed to lure a potential attacker away from critical systems?

A.
Honey Pots
B.
Vulnerability Analysis Systems
C.
File Integrity Checker
D.
Padded Cells
Explanation:
Honey pots are decoy systems that are designed to lure a potential attacker away from
critical systems. Honey pots are designed to:
Divert an attacker from accessing critical systems,
Collect information about the attacker’s activity, and encourage the attacker to stay
on the system long enough for administrators to respond.