Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Drag the WAN characteristics on the left to the branche office model where it would most likely to be used on the right.
Drag the technology on the left to the type of enterprise virtualization where it is most likely to be found on the right.
Drag the network function on the left to the functional area or module where it is most likely to be performed in the enterprise campus infrastructure on the right
Drag the network characteristic on the left to the design method on the right which will best ensure redundancy at the building distribution layer.