An administrator wants to configure key based SSH access for an AOS 5.5 Implementation
Which three components can be secured using this method?
A . The cluster
B . the CVM
C . The hypervisor host
D . Guest virtual machine
E . prism element
Answer: A,B,C