List of questions
Related questions
Question 40 - CISSP discussion
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?
A.
Host VM monitor audit logs
B.
Guest OS access controls
C.
Host VM access controls
D.
Guest OS audit logs
Your answer:
0 comments
Sorted by
Leave a comment first