Which three statements about applying access control lists to a Cisco router are true? (Choose three.)
When port security is enabled on a Cisco Catalyst switch, what is the default action when the configured maximum number of allowed MAC addresses value is exceeded?
Which state must a signature be in before any actions can be taken when an attack matches that signature?
Which statement describes how the sender of the message is verified when asymmetric encryption is used?