When should a security administrator consult the Solaris Fingerprint Database?

A.
when any suspicious Solaris file is found
B.
when any suspicious application file is found
C.
when any suspicious Sun-supplied file is found
D.
when a suspicious Solaris kernel module is found