Q: 7
Which of the following security technology is used to attract and trap people who attempt
unauthorized or illicit utilization of the host system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.