0.0% complete
Question
A software engineer trains new employees on the impacts of hardware and software vulnerabilities. The trainees must analyze and identify the vulnerability in their training session. During the session, the trainees experience a vulnerability where an attacker with access to a virtual machine (VM) breaks out of this isolated environment and gains access to the host system or other VMs running on the same host. What type of vulnerability did the trainees experience in this situation?