You have a heavily virtualized environment in which all of your virtual machines are hosted on a few large, shared servers. For security reasons, you must restrict inter-VM traffic and only allow traffic that complies with your security policies.
Which two technologies would you use to restrict inter-VM traffic? (Choose two.)
A . URL filtering
B . security intelligence
C . vSRX
D . VLAN
Answer: C,D