A client’s security policy requires separate management and control planes for different divisions within the company. Which technology can be used to achieve this requirement while minimizing the number of physical devices?
A. virtualrouting and forwarding
B. virtual device contexts
C. virtual port channels
D. virtual switching system
E. virtual local area networks