Question 356
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Question 357
Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
Question 358
What is a difference between FlexVPN and DMVPN?
Question 359
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?
Question 360
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
