Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
A . De-Militarized Zone (DMZ)
B . Firewall
C . Honeypot
D . Intrusion Detection System
Answer: C
Explanation:
Reference: https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot