Which two of the following settings can be monitored by the Cisco Security Agent (release 5.2 and later) to control user’s wireless access?
Please point out two technologies address ISO 17799 requirements to detecting, preventing and responding to attacks and intrusions.