A security administrator has finished building a Linux server which will host multiple virtual machines through hypervisor technology. Management of the Linux server, including monitoring server performance, is achieved through a third party web enabled application installed on the Linux server. The security administrator is concerned about vulnerabilities in the web application that may allow an attacker to retrieve data from the virtual machines.
Which of the following will BEST protect the data on the virtual machines from an attack?
A . The security administrator must install the third party web enabled application in a chroot environment.
B . The security administrator must install a software firewall on both the Linux server and the virtual machines.
C . The security administrator must install anti-virus software on both the Linux server and the virtual machines.
D . The security administrator must install the data exfiltration detection software on the perimeter firewall.
Answer: A