A network auditing team has observed activity from a virtual machine that may be an
organization policy security breach. The vSphere administrator needs to stop network traffic
from the virtual machine. Which step should the administrator take?
A.
Enable Port Blocking on the vSphere Distributed Switches in the organization and block
the port on which the virtual machine is connected.
B.
Enable Port Blocking on the vSphere Standard Switches in the organization and block
the port on which the virtual machine is connected.
C.
Enable Port Blocking on each vSphere Standard Switch portgroup in the organization,
then block the port on which the virtual machine is connected.
D.
Enable Port Blocking on each vSphere Distributed Switch portgroup in the organization,
then block the port on which the virtual machine is connected.