Question 21

Which are two main features of Intrusion Prevention? (Choose two.)
  • Question 22

    Which feature of CTA can separate statistically normal traffic form anomalous traffic?
  • Question 23

    Which Cisco product is a part of the Data Center threat centric solution?
  • Question 24

    Which of AMP's File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?
  • Question 25

    Which two security risks are created by legacy approaches to networking? (Choose Two)