Question 6
What are three security blind spots that must be addressed? (Choose Three)
Question 7
Which two attack vectors are protected by Malware Protection? (Choose two.)
Question 8
Which two attack vectors are protected by MFA? (Choose two.)
Question 9
Which feature of StealthWatch aggregates and normalizes NetFlow data?
Question 10
What are two reasons why perimeter-based network security is no longersufficient? (Choose Two)