👤

Honey Pots:__________
a) Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.
b) A seemingly tempting, but bogus target meant to attract (and distract) hacking attempts.
c) A system that acts as a control for network traffic, blocking unauthorized traffic, while permitting acceptable use.
d) Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.