John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Lynna
3 months agoLang
2 months agoThurman
2 months agoJackie
2 months agoBen
3 months agoCandida
2 months agoLawrence
2 months agoMagda
2 months agoGail
2 months agoSina
2 months agoReiko
3 months agoMeaghan
3 months agoGladys
3 months agoJosphine
2 months agoStevie
3 months agoMargery
3 months agoHyun
4 months agoShelia
2 months agoRebbecca
3 months agoRolande
3 months agoLavonda
3 months agoMurray
4 months agoRima
4 months agoFrederica
3 months agoJonelle
3 months agoGerald
4 months agoEladia
4 months agoTiera
4 months ago