When the Cisco ASA detects scanning attacks, how long is the attacker who is performing the scan shunned?
Where in the ACS are the individual downloadable ACL statements configured to achieve the most scalable deployment?
Which three Cisco ASA configuration commands are used to enable the Cisco ASA to log only the debug output to syslog?