Which two groups of settings should be reviewed when attempting to increase the security of virtual machines (VMs)? (Choose two.)
A.
Disable hardware devices
B.
Disable unexposed features
C.
Disable VMtools devices
D.
Disable VM Template features