Question 87:
A security analyst implemented a solution that would analyze the attacks that the organization`s firewalls failed to prevent. The analyst used the existing systems to enact the solution and executed the following command: $ sudo nc -1 "v "e maildaemon.py 25 > caplog.txt Which of the following solutions did the analyst implement?
Answer options:
A. Log collector B. Crontab mail script C. Sinkhole D. Honeypot