PdfPrep.com

Which of the following should be implemented to stop an attacker from interacting with the hypervisor through another guest?

Which of the following should be implemented to stop an attacker from interacting with the hypervisor through another guest?
A . Containers
B . VM escape protection
C . Security broker
D . Virtual desktop

Answer: B

Exit mobile version