[TABS_R id=7830]
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
- De-Militarized Zone (DMZ)
- Firewall
- Honeypot
- Intrusion Detection System
[TABS_R id=7830]