Question 6
What is the term used to describe a port or interface that shares traffic from more than one VLAN?
Question 7
Bridged Virtual Systems in a cluster monitor which of the following protocols, to fail over a bridged system?
Question 8
Which of the following commands should you run to stop a VSX Gateway Cluster?
Question 9
Which of the following statements is true concerning the default Security Policy of the External Virtual Router?
Question 10
Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.
