31/p3


  • What are vulnerabilities associated with implementing virtualization?
  • What is the likelihood for each vulnerability that it could be exploited?
  • What strategies/methods can be used to mitigate the risks for virtualization?