How does the Cisco Security Agent proactively stop both known and unknown attacks?()
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()