What would best mitigate the executable-code exploits that can perform a variety of malicious acts, such as erasing your hard drive?
How would you copy packets that have been captured from the data interfaces to a location off the Cisco IDS or IPS sensor?