A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?
A) Host VM monitor audit logs
B) Guest OS access controls
C) Host VM access controls
D) Guest OS audit logs
Correct Answer:
Verified
Q71: Which of the following is the MOST
Q72: Which of the following is the MOST
Q73: Change management policies and procedures belong to
Q74: A security professional should ensure that clients
Q75: Why are packet filtering routers used in
Q77: A financial company has decided to move
Q78: What is the expected outcome of security
Q79: Users require access rights that allow them
Q80: An organization lacks a data retention policy.
Q81: Which technique can be used to make
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents