CompTIA Security+ SY0-701 Practice Question
You work as a freelance security consultant. You are now working for a large government and have been contracted to create a stand-alone system that should attract malicious activity. The system should mimic an existing productive system but with fake non-sensitive data. The activity in this new system should be recorded so security analysts can review and identify patterns in the malicious activity. What best defines this type of system?
DDoS Mitigator
Ad hoc target
Honeynet
DMZ