An analyst has received unusual alerts on the SIEM dashboard. The analyst wants to get payloads that the hackers are sending toward the target systems without impacting the
business operation. Which of the following should the analyst implement?
A. Honeypot
B. Jump box
C. Sandboxing
D. Virtualization