3.1 Requirements

To use virtual machines in a security class, it is important to recognize the necessary resources.