Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the
System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap Bob.
What is a Virtual Environment?
- A Honeypot that traps hackers
- A system Using Trojaned commands
- An environment set up after the user logs in
- An environment set up before a user logs in
Reveal Solution Next Question