A security analyst created a fake account and saved the password in a non-readily accessible directory in a spreadsheet. An alert was also configured to notify the security team if the spreadsheet is opened. Which of the following best describes the deception method being deployed?
Teliyah21
3 weeks, 4 days agodrew81
3 weeks, 5 days agoCommando9800
1 month agotest_arrow
2 months ago