Which of the following describes the ability of code to target a hypervisor from inside a guest OS?
A. Fog computing
B. VM escape
C. Software-defined networking
D. Image forgery
E. Container breakout
A. Fog computing
B. VM escape
C. Software-defined networking
D. Image forgery
E. Container breakout