Bob has been trying to penetrate a remote production system for the past tow weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However law enforcement agencies were recoding his every activity and this was later presented as evidence.
The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?
A.
A Honeypot that traps hackers
B.
A system Using Trojaned commands
C.
An environment set up after the user logs in
D.
An environment set up before an user logs in