A.BPA attack B.Adaptive chosen ciphertext attack C.DDoS attack D.Man-in-the-middle attack
A.takes a snapshot of the router running configuration and securely archives it in persistent storage B.stores a secured copy of the Cisco IOS image in its persistent storage C.backs up the Cisco IOS image from flash to a TFTP server D.enables Cisco IOS image resilience
A.Selecting the interface to which the IPS rule will be applied B.Selecting the Signature Definition File (SDF) that the router will use C.Selecting the direction of traffic that will be inspected D.Selecting the inspection policy that will be applied to the interface