What will happen when traffic being filtered by the access list does not match the configured ACL statements for Serial 0?
In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?