Which of the following should be implemented to stop an attacker from interacting with the hypervisor through another guest?
A . Containers
B . VM escape protection
C . Security broker
D . Virtual desktop
Answer: B
Which of the following should be implemented to stop an attacker from interacting with the hypervisor through another guest?
A . Containers
B . VM escape protection
C . Security broker
D . Virtual desktop
Answer: B