Implementing Cisco Network Security (IINS v3.0) (#154)

Which two statements about hardware-based encryption are true? (Choose two.)

It is potentially easier to compromise than software-based encryption
It requires minimal configuration
It can be implemented without impacting performance.
It is widely accessible
It is highly cost-effective