Virtualized applications, such as virtualized browsers, can protect the underlying operating system from which of the following?
A.
Malware installation from suspects Internet sites
B.
DDoS attacks against the underlying OS
C.
Man-in-the-middle attacks
D.
Phishing and spam attacks