A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:
Network Architecture | |
Network operations | |
Network security | |
Troubleshooting | |
Industry standards, practices, and network theory |