Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Gail
3 months agoCarey
3 months agoRichelle
3 months agoSanda
4 months agoKaitlyn
4 months agoTamekia
4 months agoEleni
4 months agoEllsworth
4 months agoGladys
5 months agoAleisha
5 months agoLorean
5 months agoShannon
5 months agoLeonard
5 months agoTerrilyn
5 months agoDoug
10 months agoJesusa
9 months agoMireya
9 months agoAlex
9 months agoVicente
9 months agoLeontine
10 months agoMajor
9 months agoEdmond
9 months agoLarue
10 months agoCarissa
10 months agoDorinda
11 months agoRoyal
9 months agoFabiola
9 months agoMaryann
9 months agoGerman
10 months agoDenny
11 months agoGretchen
11 months ago