John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Blair
3 months agoLazaro
3 months agoJesus
3 months agoHerschel
4 months agoLashaun
4 months agoValentin
4 months agoSilva
4 months agoNoel
4 months agoPrecious
5 months agoDan
5 months agoElizabeth
5 months agoSocorro
5 months agoMajor
5 months agoYong
5 months agoLynna
10 months agoLang
8 months agoThurman
9 months agoJackie
9 months agoBen
10 months agoCandida
8 months agoLawrence
8 months agoMagda
8 months agoGail
9 months agoSina
9 months agoReiko
9 months agoMeaghan
9 months agoGladys
10 months agoJosphine
9 months agoStevie
9 months agoMargery
9 months agoHyun
10 months agoShelia
9 months agoRebbecca
9 months agoRolande
9 months agoLavonda
10 months agoMurray
10 months agoRima
10 months agoFrederica
9 months agoJonelle
10 months agoGerald
11 months agoEladia
11 months agoTiera
11 months ago