John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Lynna
1 months agoLang
8 days agoThurman
13 days agoJackie
17 days agoBen
2 months agoCandida
6 days agoLawrence
8 days agoMagda
9 days agoGail
16 days agoSina
20 days agoReiko
28 days agoMeaghan
1 months agoGladys
2 months agoJosphine
21 days agoStevie
28 days agoMargery
1 months agoHyun
2 months agoShelia
22 days agoRebbecca
28 days agoRolande
1 months agoLavonda
1 months agoMurray
2 months agoRima
2 months agoFrederica
1 months agoJonelle
2 months agoGerald
2 months agoEladia
2 months agoTiera
3 months ago