A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation .
What MUST an administrator review to audit a user’s access to data files?
A . Host VM monitor audit logs
B . Guest OS access controls
C . Host VM access controls
D . Guest OS audit logs
Answer: A
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund