An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose. Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locationsand techniques.
Identify the type of device deployed by Steven in the above scenario.
Freeman
2 months agoGene
2 days agoLino
23 days agoKenneth
2 months agoKimbery
16 days agoLeoma
19 days agoRickie
1 months agoKarl
2 months agoTheola
2 months agoLashaunda
13 days agoEnola
15 days agoWade
17 days agoKimberlie
20 days agoMajor
2 months agoVerdell
2 months agoLing
3 months ago