A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network is known as:
Networking Fundamentals | |
Network Implementations | |
Network Operations | |
Network Security | |
Network Troubleshooting |