Today’s SY0-601 Security+ Pop Quiz: Howdy, TexA security administrator would like to document the process used by attackers when they visit a company website. Which of the following would be the BEST way to obtain this information? Hash table Honeypot DNS sinkhole MDM Cold site Tranquilize and tag