Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Gail
4 months agoCarey
5 months agoRichelle
5 months agoSanda
5 months agoKaitlyn
5 months agoTamekia
6 months agoEleni
6 months agoEllsworth
6 months agoGladys
6 months agoAleisha
6 months agoLorean
6 months agoShannon
6 months agoLeonard
6 months agoTerrilyn
6 months agoDoug
12 months agoJesusa
10 months agoMireya
11 months agoAlex
11 months agoVicente
11 months agoLeontine
12 months agoMajor
11 months agoEdmond
11 months agoLarue
12 months agoCarissa
12 months agoDorinda
1 year agoRoyal
11 months agoFabiola
11 months agoMaryann
11 months agoGerman
11 months agoDenny
1 year agoGretchen
1 year ago