If compromised, which of the following would lead to the exploitation of multiple virtual machines?
A.
Virtual device drivers
B.
Virtual machine monitor
C.
Virtual machine instance
D.
Virtual machine file system
If compromised, which of the following would lead to the exploitation of multiple virtual machines?
If compromised, which of the following would lead to the exploitation of multiple virtual machines?
A.
Virtual device drivers
B.
Virtual machine monitor
C.
Virtual machine instance
D.
Virtual machine file system