A.aaa authentication enable method default B.aaa authentication enable default C.aaa authentication enable level D.aaa authentication enable default local
A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall
A.It is restricted in size to only three segments B.It requires the use of netBT as the network protocol C.It requires the implementation of IKE D.It relies on an underlying Public Key Infrastructure