While limiting the creation of virtual machine images and snapshots (option D) may also help mitigate risks associated with data stored on virtual machines, it may not be as effective as restricting access to existing images and snapshots, particularly if unauthorized individuals already have access to these resources.
Therefore, restricting access to images and snapshots of virtual machines is likely the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines.
A, Virtual Machines are used in staging or testing environment, Therefore, you cannot restrict access to the Data, hence monitoring is the correct answer
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MunaM
Highly Voted 1 year, 10 months agoSwallows
Most Recent 1 month ago3008
7 months, 2 weeks agoRabotai
8 months, 2 weeks agocidigi
11 months, 1 week agom4s7er
1 year, 5 months ago