Question 6

What is the term used to describe a port or interface that shares traffic from more than one VLAN?
  • Question 7

    Bridged Virtual Systems in a cluster monitor which of the following protocols, to fail over a bridged system?
  • Question 8

    Which of the following commands should you run to stop a VSX Gateway Cluster?
  • Question 9

    Which of the following statements is true concerning the default Security Policy of the External Virtual Router?
  • Question 10

    Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.