This allows the hypervisor to take full control of the hardware and provide direct access to the underlying hardware, which allows for efficient use of resources and more direct control over the virtual environment. The CISA Study Manual recommends that organizations use best practices when setting up virtualized environments to ensure that the underlying hardware and software are configured correctly and securely.