Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF?