Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Doug
2 months agoJesusa
9 days agoMireya
19 days agoAlex
23 days agoVicente
28 days agoLeontine
2 months agoMajor
19 days agoEdmond
29 days agoLarue
2 months agoCarissa
2 months agoDorinda
2 months agoRoyal
17 days agoFabiola
23 days agoMaryann
30 days agoGerman
1 months agoDenny
2 months agoGretchen
2 months ago