ISC Certified Information Systems Security Professional (CISSP) CISSP Question # 17 Topic 2 Discussion

ISC Certified Information Systems Security Professional (CISSP) CISSP Question # 17 Topic 2 Discussion

CISSP Exam Topic 2 Question 17 Discussion:
Question #: 17
Topic #: 2

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?


A.

Host VM monitor audit logs


B.

Guest OS access controls


C.

Host VM access controls


D.

Guest OS audit logs


Get Premium CISSP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.