Virtualized applications, such as virtualized browsers, are capable of protecting the underlying operating system from which of the following?
A.
Malware installation from suspects Internet sites
B.
Man-in-the-middle attacks
C.
Phishing and spam attacks
D.
DDoS attacks against the underlying OS