sanchezgirl6756 sanchezgirl6756 23-04-2024 Computers and Technology contestada Which solution would an organization use to create a decoy, mimicking a vulnerable system to deceive attackers? a. Intrusion Prevention System (IPS) b. Firewall c. Honeypot d. Intrusion Detection System (IDS)