A recent internal audit is forcing a company to review each internal business unit’s VMs because the cluster they are installed on is in danger of running out of computer resources.
Which of the following vulnerabilities exist?
A. Buffer overflow
B. End-of-life systems
C. System sprawl
D. Weak configuration