Drag and Drop Drag and drop the steps to configure a WSA from the left into the correct order on the right. Select and Place:

Drag and Drop Drag and drop each feature that can protect against DHCP attacks from the left onto the correct description on the right. Select and Place:

Drag and Drop Drag the recommendations on the left to the Cryptographic Algorithms on the right. Options will be used more than once. Select and Place: