A security analyst created a fake account and saved the password in a non-readily accessible directory in a spreadsheet. An alert was also configured to notify the security team if the spreadsheet is opened. Which of the following best describes the deception method being deployed?
squishy_fishy
2Â weeks, 1Â day agoBurnboy
2Â weeks, 3Â days agoTeliyah21
1Â month, 1Â week agodrew81
1Â month, 1Â week agoCommando9800
1Â month, 3Â weeks agotest_arrow
2Â months, 3Â weeks ago