what a stupid question According to the official cert guide
"The second security feature intended to help prevent boot-level malware is measured boot. These boot processes measure each component, starting with the firmware and ending with the boot start drivers. Measured boot does not validate against a known good
list of signatures before booting; instead, it relies on the UEFI firmware to hash the firmware, bootloader, drivers, and anything else that is part of the boot process"
That seems to suggest option A is a part of option C.
But it doesn't end there, it goes on to say "The data gathered is stored in the Trusted Platform Module (TPM), and the logs can be validated remotely to let security administrators know the boot state of the system. This boot attestation process allows comparison against known good states, and administrators can take action if the
measured boot shows a difference from the accepted or secure known state"
So that then says measured boot is a uefi drive boot attestation process so take your pick from A, B or C!