________ are decoy systems that are designed to lure a potential attacker away from critical systems.
What will be an ideal response?
Question 2
The functional components of an _________ are: data source, sensor, analyzer, administration, manager, and operator.
What will be an ideal response?