____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. Select one: a. Log file monitors b. Honeypots c. Trap and trace systems d. Packet exchangers