Which of the following data states applies to data that is being actively processed by a database server?
During a penetration test in a hypervisor, the security engineer is able to inject a malicious payload and access the host filesystem. Which of the following best describes this vulnerability?
Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
Which of the following is a possible consequence of a VM escape?