Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Leontine
10 hours agoLarue
2 days agoCarissa
5 days agoDorinda
6 days agoDenny
7 days agoGretchen
13 days ago