what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?
which one determines if the IOSbased IPS feature will drop or permit traffic for a particular IPS signature engine while a new signature for that engine is being compiled?