Which option BEST describes a security concern when dealing with virtual infrastructure or hypervisors?
Zero Day
Privileged container escape
Rogue VM
Virtual hostname spoofing
Virtualization and Cloud Computing | |
Networking | |
Hardware | |
Hardware and Network Troubleshooting | |
Mobile Devices |