Question 51
Which three products are Cisco Advanced Threat solutions? (Choose three.)
Question 52
Which two attack vectors are protected by Web Security? (Choose two.)
Question 53
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
Question 54
Which two products are involved in granting safe access to apps? (Choose two.)
Question 55
What are two key Cisco loT use cases? (Choose two.)