Question 31
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Question 32
Which type of attack is social engineering?
Question 33
Which two components do southbound APIs use to communicate with downstream devices? (Choose two.)
Question 34
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Question 35
Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?