John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Lynna
1 months agoLang
6 days agoThurman
11 days agoJackie
15 days agoBen
2 months agoCandida
4 days agoLawrence
6 days agoMagda
7 days agoGail
14 days agoSina
18 days agoReiko
26 days agoMeaghan
1 months agoGladys
2 months agoJosphine
19 days agoStevie
26 days agoMargery
1 months agoHyun
2 months agoShelia
20 days agoRebbecca
26 days agoRolande
30 days agoLavonda
1 months agoMurray
2 months agoRima
2 months agoFrederica
1 months agoJonelle
2 months agoGerald
2 months agoEladia
2 months agoTiera
2 months ago