Which of the following is the proper use of a Faraday cage?
A . To block electronic signals sent to erase a cell phone
B . To capture packets sent to a honeypot during an attack
C . To protect hard disks from access during a forensics investigation
D . To restrict access to a building allowing only one person to enter at a time
Answer: A