Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
Apply existing information security controls
Apply virtualized controls to the physical host
Secure the virtualized platform
Secure the virtualized workload
Submit