Question 21
Which are two main features of Intrusion Prevention? (Choose two.)
Question 22
Which feature of CTA can separate statistically normal traffic form anomalous traffic?
Question 23
Which Cisco product is a part of the Data Center threat centric solution?
Question 24
Which of AMP's File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?
Question 25
Which two security risks are created by legacy approaches to networking? (Choose Two)