John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Maryrose
5 months agoDeeann
6 months agoDenna
6 months agoShayne
6 months agoVilma
6 months agoStefania
6 months agoNickole
6 months agoDylan
6 months agoCeola
6 months agoElin
6 months agoJohnetta
6 months agoAdela
6 months agoPortia
6 months ago