zeneth computers is a software development company. it has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. the company has contacted you, a network analyst, to verify if such claims are indeed true. you have decided to set up a trap for the hackers by putting up a system containing false financial data. which of the following will you use in this scenario?