A security analyst created a fake account and saved the password in a non-readily accessible directory in a spreadsheet. An alert was also configured to notify the security team if the spreadsheet is opened. Which of the following best describes the deception method being deployed?
squishy_fishy
2Â months agoBurnboy
2Â months, 1Â week agoTeliyah21
3Â months agodrew81
3Â months agoCommando9800
3Â months, 1Â week agotest_arrow
4Â months, 2Â weeks ago