Which are two reasons perimeter-based network security is no longer sufficient? (Choose
two )
Which two elements does Tetration provide for security posture and traffic analysis? (Choose two.)
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
Which three products are in Cisco's Web & Email Security portfolio? (Choose three.)
Which two attack vectors are protected by NGFW? (Choose two.)
In which two ways should companies modernize their security philosophies? (Choose two.)
What are two steps customers can take to evolve to a trust-centric security philosophy?
(Choose two.)
Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)
Which two areas require secure access? (Choose two.)
Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)