✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
| Column A (Device) | Column B (Function) |
|---|---|
| 1. Proxy Server | A. Logs keystrokes of attackers |
| 2. Honeypot | B. Filters harmful websites |
| 3. Internet Content Filter | C. Acts as intermediary for client requests |
| 4. Protocol Analyzer | D. Captures and decodes network packets |