Which solution would an organization use to create a decoy, mimicking a vulnerable system to deceive attackers?

Related Book For  answer-question

Principles Of Information Security

ISBN: 9780357506431

7th Edition

Authors: Michael E. Whitman, Herbert J. Mattord

Posted Date: