Question 56
Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)
Question 57
Which feature in the DNS security module provide on and off network DNS protection?
Question 58
What are the competing IT and Operation Technology (OT) priorities that make securing IoT difficult?
Question 59
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose Two)
Question 60
Which two Cisco products help manage data access policy consistently? (Choose two.)