A. [edit security] B. [edit protocols] C. [edit firewall] D. [edit policy-options]
A. It enables an attacker to perform an IP sweep of devices. B. It enables a hacker to know which operating system the system is running. C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic. D. It creates a ping of death and can cause the entire network to be infected with a virus.
A. A security zone can contain one or more interfaces. B. A security zone can contain interfaces in multiple routing instances. C. A security zone must contain two or more interfaces. D. A security zone must contain bridge groups.