Respuesta :

Answer:

There are four options for these questions: and d is correct answer

a. signature

b. priority file

c. moles

d. honeytoken

Explanation:

Honeytokens are words or fictitious records implemented in a database, with this option we can track data in a complex situation, for example, in cloud computing, if someone tries to steal data from the database we can detect, who was the thief, and we can add a honeytoken in every record of our database.

Q&A Education