A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis.
In which of the following technologies is the analyst interested?
A . Sandboxing
B . Staging
C . DMZ
D . Honeypot
Answer: A