An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
Kenneth
7 days agoKarl
8 days agoTheola
18 days agoMajor
21 days agoVerdell
23 days agoLing
27 days ago