Which of the following options BEST describes the role of a honeynet in a network security strategy?
A real segment of the network that is intentionally weakened to attract attackers and study their behavior in a live environment.
A set of redundant network configurations that bewilder attackers by constantly changing DHCP configurations.
An isolated network that prevents access to production services and data for users or entities appearing risky or unverified.
A separate network system designed to resemble genuine production systems, configured to lure attackers by exposing seemingly vulnerable services, to monitor their activities.