Which three tasks should be completed in order to achieve the goal of limiting network access for Bob via downloadable ACLs?
Which two options are correct about the threat detection feature of the Cisco ASA adaptive security appliance?