Question 46
Which two attack vectors are protected by email security? (Choose two)
Question 47
Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)
Question 48
Which customer use case is challenged by device incompatibility, OS diversity, and a multitude of third-party application?
Question 49
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
Question 50
Which three products are Cisco Advanced Threat solutions? (Choose three.)