Which of the following is most likely to be deployed to obtain and analyze attacker activity and techniques?
Correct Answer: C
A honeypot is most likely to be deployed to obtain and analyze attacker activity and techniques. A honeypot is a decoy system set up to attract attackers, providing an opportunity to study their methods and behaviors in a controlled environment without risking actual systems.
Honeypot: A decoy system designed to lure attackers, allowing administrators to observe and analyze attack patterns and techniques.
Firewall: Primarily used to block unauthorized access to networks, not for observing attacker behavior.
IDS (Intrusion Detection System): Detects and alerts on malicious activity but does not specifically engage attackers to observe their behavior.
Layer 3 switch: Used for routing traffic within networks, not for analyzing attacker techniques.