A.50 B.100 C.150 D.200 E.250
A. It should be implemented in a management VLAN. B. Its connection to managed devices should be over a data VLAN. C. It is made up of Cisco Security MARS and Clean Access software. D. It should be deployed as close to the edge of the network as possible. E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
A. secure tunnels B. a separate management VLAN C. secure VLANs to isolate sensors D. an out-of-band path around the firewall E. asymmetric traffic flows to isolate sensors F. private VLANs to put all sensors on isolated ports