An administrator is tasked with ensuring the security of network traffic during the migration of virtual machines (VMs) to prevent any potential interception or tampering of data.
What specific feature or configuration should the administrator enable to safeguard the integrity and confidentiality of the network traffic involved in VM migration?
Submit