caroline49651 caroline49651 20-12-2022 Computers and Technology Answered to attract and monitor malicious user activity, you need to deploy a single server with fake data that appears vulnerable. what should you configure?