odavis5382 odavis5382 16-11-2022 Computers and Technology contestada a client is concerned about a hacker compromising a network in order to gain access to confidential research data. what could be implemented to redirect any attackers on the network?