A vulnerability in which of the following virtual systems should be of GREATEST concern to an IS auditor?
A. The virtual machine management server
B. The virtual application server
C. The virtual antivirus server
D. The virtual file server
A. The virtual machine management server
B. The virtual application server
C. The virtual antivirus server
D. The virtual file server