You are creating a data center security design. Virtual security functions must be performed on east-west
traffic. Security functions must be commissioned and decommissioned frequently, and the least resource- intensive architecture must be used.
In this scenario, what will accomplish this task?
Currently there are no comments in this discussion, be the first to comment!