Scenario: A Citrix Architect is conducting a security assessment. During the assessment, the architect gathers the following Hardware Layer requirements from the customer:
✑ Reduce the attack surface of the XenServer resource pools.
✑ Prevent unauthorized access to NFS storage.
✑ Encrypt Administrative connections to the XenServer resource pools.
Which three practices should the architect recommend so that the organization can meet its objectives? (Choose three.)