A financial institution is planning to enhance its cybersecurity posture by actively defending against potential breaches. Which of the following strategies aligns BEST with active defense mechanisms aimed at deceiving attackers and studying their techniques?
Installing a next-generation firewall
Implementing extensive network segmentation
Setting up a honeypot
Enforcing a strict patch management protocol