Which four statements are correct regarding management access to a Cisco Intrusion Prevention System?