Which of the following describes the ability of code to target a hypervisor from inside a guest OS?
A . Fog computing
B . VM escape
C . Software-defined networking
D . Image forgery
E . Container breakout
Answer: B
Which of the following describes the ability of code to target a hypervisor from inside a guest OS?
A . Fog computing
B . VM escape
C . Software-defined networking
D . Image forgery
E . Container breakout
Answer: B