Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones.
What is a virtual environment?
A.
A system using Trojaned commands
B.
A honeypot that traps hackers
C.
An environment set up after the user logs in
D.
An environment set up before an user logs in