31/p3 / security What are vulnerabilities associated with implementing virtualization?What is the likelihood for each vulnerability that it could be exploited?What strategies/methods can be used to mitigate the risks for virtualization?