Which two Cisco products/feature provide the best security controls for a web server having applications running on it that perform inadequate input data validation?
Which two protocols can perform high-availability IPS design by use of the Cisco IPS 4200 Series Sensor appliance?
Please suggest one encryption protocol to your customer from an enterprise with standard security requirements.
Which is the best countermeasure to protect against rogue access points that are outside the enterprise physical perimeter and that attempt to attract legitimate clients?
Which one can be used to provide logical separation between the voice and data traffic at the access layer?