A.On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B.On all client computers, implement logon auditing for all user account logons
C.On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D.On all domain controllers, implement logon auditing for all user account logons