Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?
A. Isolation
B. Authentication
C. Hardening
D. Authorization
A. Isolation
B. Authentication
C. Hardening
D. Authorization