Which countermeasure is best used to protect against rogue access points that are outside the enterprise physical perimeter and that attempt to attract legitimate clients?
Which two settings can the Cisco Security Agent (release 5.2 and later) monitor to control user’s wireless access?
Which two methods do the routers at the regional office, branch office, and telecommuter location use to prevent traffic going to and from the attacker?
What should be configured to maintain symmetric flow of traffic when using the Gateway Load Balancing Protocol to enable high-availability Cisco IOS firewalls?