Which answer best describes the implementation of IBN using the Cisco WLC v7.0 and Cisco Secure ACS v4.2?
What is the effect of setting Client Exclusion to Enabled and set to a Timeout Value of 0 seconds in a Cisco WLC v7.0?
Which statement correctly describes the results when malicious traffic is detected from a wireless client?