Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Doug
1 months agoMireya
10 days agoAlex
14 days agoVicente
19 days agoLeontine
2 months agoMajor
10 days agoEdmond
20 days agoLarue
2 months agoCarissa
2 months agoDorinda
2 months agoRoyal
8 days agoFabiola
14 days agoMaryann
21 days agoGerman
24 days agoDenny
2 months agoGretchen
2 months ago