Which of the following methods could be used to provide a false customer database to the attacker?
seenagape
A network administrator has discovered attempts to penetrate the network and access the customer database. Which of the following methods could be used to provide a false customer database to the attacker?