Question 16
What is the function of SDN southbound API protocols?
Question 17
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Question 18
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
Question 19
Which algorithm provides encryption and authentication for data plane communication?
Question 20
What are the two types of managed Intercloud Fabric deployment models? (Choose two)


