John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Maryrose
4 months agoDeeann
4 months agoDenna
4 months agoShayne
4 months agoVilma
5 months agoStefania
5 months agoNickole
5 months agoDylan
5 months agoCeola
5 months agoElin
5 months agoJohnetta
5 months agoAdela
5 months agoPortia
5 months ago