Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.
A.
Warp Interfaces
B.
Warp and Virtual Interfaces
C.
All Interfaces
D.
Virtual Interfaces
E.
Physical Interfaces
Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.
Security Policies enforced by Virtual Systems are applied to ___________ connected to the Virtual IP Stack.
A.
Warp Interfaces
B.
Warp and Virtual Interfaces
C.
All Interfaces
D.
Virtual Interfaces
E.
Physical Interfaces