The purpose of the ________ is to bypass the virtualization software and provide the VNF with a direct memory access path to the NIC.

A) Network interface card
B) CPU/memory
C) e Switch
D) Control and admin agent

C) e Switch

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT one of the three largest search engines?

A) Bing B) Google C) AOL D) Yahoo!

Computer Science & Information Technology

Twitter allows you to send private tweets in the form of ________ to anyone who follows your tweets

A) personal tweets B) direct messages C) secret messages D) protected tweets

Computer Science & Information Technology