You plan to launch a VM instance with the VM.Standard2.24 shape and Oracle Linux 8 platform image. You want to protect your VM instance from low-level threats, such as rootkits and bootkits that can infect the firmware and operating system and are difficult to detect.
What should you do?
A. Create a shielded instance.
B. Use Vulnerability Scanning Service.
C. Use in-transit encryption.
D. Create a burstable instance.