A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces?
|Compliance and Operational Security|
|Threats and Vulnerabilities|
|Application, Data and Host Security|
|Access Control and Identity Management|