This is a dedicated watch page for a single video.
An engineer suspects that attackers have been targeting her organization's servers. She wants to put a system in place, isolated from all production systems, to trick attackers into thinking it is a legitimate server. This will allow her to monitor the attackers' behavior and see what they are trying to do on her network. What is this isolated system called?