A. Routing B. MPLS VPNs C. Access control D. Intrusion detection
A. By adding two separate connections in the connections dialog box B. By adding two separate intranet Controllers under the configuration hierarchy C. By adding one intranet Controller and one SA under the configuration hierarchy D. By adding two URLs under a connection in the connections dialog box
A. resource access policies B. Host Enforcer policies C. source IP enforcement policies D. IPsec enforcement policies