What is applied to tunnel interfaces to allow QoS policies to be applied to packets going through the tunnel?
Which two statements about the open and shared key wireless-authentication methods are true? (Choose two)