Your LAN is isolated from the Internet by a perimeter network. You suspect that someone is trying to gather information about your LAN. The IT director asks you to gather as much information about the attacker as possible while preventing the attacker from knowing that the attempt has been detected. What is the best method to accomplish this?
A. Deploy a DMZ.
B. Deploy a proxy server in the perimeter network.
C. Deploy a NIPS outside the perimeter network.
D. Deploy a honeypot in the perimeter network.
Answer: D. Deploy a honeypot in the perimeter network.