Stephen, a security specialist, was instructed to identify emerging threats on the organization's network. In this process, he employed a computer system on the Internet intended to attract and trap those who attempt unauthorized host system utilization to penetrate the organization's network.
Identify the type of security solution employed by Stephen in the above scenario.
Gaynell
5 months agoLavonda
5 months agoNorah
5 months agoMignon
5 months agoKarma
5 months agoJacqueline
6 months agoNan
6 months agoQueen
4 months agoZana
4 months agoGladys
5 months agoAlverta
5 months agoLai
6 months agoRoselle
6 months agoAnglea
6 months agoArt
5 months agoMatilda
5 months agoRaymon
5 months agoNaomi
6 months agoMaile
6 months agoRodrigo
7 months agoLaurena
6 months agoJoana
6 months ago