Which of the following serves the purpose of trying to lure a malicious attacker into a system?
a. Honeypot
b. Pot of gold
c. DMZ
d. Bear trap
Answer: A
A honeypot is used to serve as a decoy and lure a malicious attacker. Answers B and D are incorrect answers and are not legitimate terms for testing purposes. Answer C is incorrect because a demilitarized zone (DMZ) is an area between the Internet and the internal network.