Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Doug
6 days agoLeontine
9 days agoLarue
11 days agoCarissa
13 days agoDorinda
15 days agoDenny
16 days agoGretchen
21 days ago