Question 6
Which two features are used to stop IP spoofing in and out of your network? (Choose two.)
Question 7
You are designing a data center interconnect between two sites across a service provider Layer 3 VPN service.
The sites require Layer 2 connectivity between hosts, and the connection must be secure.
In this scenario, what will accomplish this task?
The sites require Layer 2 connectivity between hosts, and the connection must be secure.
In this scenario, what will accomplish this task?
Question 8
You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows.
Which two design components will accomplish this task? (Choose two.)
Which two design components will accomplish this task? (Choose two.)
Question 9
Policy Enforcer provides which benefit?
Question 10
You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs.
Which two statements are correct in this scenario? (Choose two.)
Which two statements are correct in this scenario? (Choose two.)