An administrator has been instructed to secure existing virtual machines in vCenter Server.
Which two actions should the administrator take to secure these virtual machines? (Choose two.)
A.
Disable native remote management services
B.
Restrict Remote Console access
C.
Use Independent Non-Persistent virtual disks
D.
Prevent use of Independent Non-Persistent virtual disks