Which two of the following describe how isolation can be achieved for VMDC data center security? (Choose two.)
A. intrusion prevention appliances that inspect traffic and detect security events on a per-VLAN basis
B. role-based access and authentication
C. virtual routing and forwarding tables
D. proper infrastructure hardening
E. application redundancy
F. policy enforcement and access control