John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Maryrose
12 days agoDeeann
17 days agoDenna
23 days agoShayne
28 days agoVilma
1 month agoStefania
1 month agoNickole
1 month agoDylan
1 month agoCeola
1 month agoElin
1 month agoJohnetta
1 month agoAdela
1 month agoPortia
2 months ago