Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Doug
3 months agoJesusa
2 months agoMireya
2 months agoAlex
2 months agoVicente
2 months agoLeontine
3 months agoMajor
2 months agoEdmond
2 months agoLarue
3 months agoCarissa
3 months agoDorinda
3 months agoRoyal
2 months agoFabiola
2 months agoMaryann
2 months agoGerman
2 months agoDenny
3 months agoGretchen
4 months ago