A company wants to get alerts when others are researching and doing reconnaissance on the company. One approach would be to host a part of the infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?
1403ad2
Highly Voted 1 year, 4 months ago1403ad2
1 year, 4 months agoAspiringNerd
Most Recent 1 year, 1 month agoHs1208
1 year, 5 months ago[Removed]
1 year, 5 months ago