A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user-s access to data files?
A. Host VM monitor audit logs
B. Guest OS
access controls
C. Host VM access controls
D. Guest OS audit logs