Q: This week we have researched virtualization, mostly focusing on the hypervisor, and the security benefits of virtualization. Please research and list two security drawbacks of virtualization, and the potential attacks that could be used to compromise them. The methods of attack may be very technical in nature, so feel free to generalize slightly while citing the actual method. ...