Bob has been trying to penetrate a remote production system for the past tow weeks. This time
however, he is able to get into the system. He was able to use the System for a period of three
weeks. However law enforcement agencies were recoding his every activity and this was later
presented as evidence. The organization had used a Virtual Environment to trap BoB. What is a
Virtual Environment?
A.
A Honeypot that traps hackers
B.
A system Using Trojaned commands
C.
An environment set up after the user logs in
D.
An environment set up before an user logs in