A VNX customer has configured multiple CIFS servers and IP interfaces for general office use.
CIFS servers are configured both on the physical Data Mover and also on multiple Virtual Data
Movers.
They now need to re-purpose one CIFS server to make it accessible on a separate, isolated
subnet. They have researched the concept of “Interface Stealing”.
Which statement is correct about Interface Stealing with CIFS servers?

A.
It is possible between CIFS Servers hosted on the same virtual Data Mover.
B.
It is impossible between CIFS Servers hosted on the same physical Data Mover.
C.
It is possible between CIFS servers hosted on different Data Movers (physical or virtual).
D.
It is impossible from the default CIFS Server hosted on the physical Data Mover.