Project Report
Build a virtual environment to simulate the same attack in your selected incident. This environment should include all of the VMs that you believe are necessary to simulate the attack (no less than 3 target VMs). This setup includes target…