An organization is required to set a custom registry key on the guest operating system. Which of the following should the organization implement to facilitate this requirement?
A. A configuration management solution
B. A log and event monitoring solution
C. A file integrity check solution
D. An operating system ACL
A. A configuration management solution
B. A log and event monitoring solution
C. A file integrity check solution
D. An operating system ACL