A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces?
Network Security | |
Compliance and Operational Security | |
Threats and Vulnerabilities | |
Application, Data and Host Security | |
Access Control and Identity Management | |
Cryptography |