An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
Freeman
2 months agoDierdre
23 days agoJeanice
24 days agoGene
27 days agoLino
2 months agoKenneth
3 months agoKimbery
1 months agoLeoma
1 months agoRickie
2 months agoKarl
3 months agoTheola
3 months agoLashaunda
1 months agoEnola
1 months agoWade
1 months agoKimberlie
1 months agoMajor
3 months agoVerdell
3 months agoLing
3 months ago