Which two actions can be configured to allow traffic to traverse an interface when zone-based security is being employed?
Which statement best describes configuring access control lists to control Telnet traffic destined to the router itself?
Which VoIP components can permit or deny a call attempt on the basis of a network’s available bandwidth?