Question 6

Which two features are used to stop IP spoofing in and out of your network? (Choose two.)
  • Question 7

    You are designing a data center interconnect between two sites across a service provider Layer 3 VPN service.
    The sites require Layer 2 connectivity between hosts, and the connection must be secure.
    In this scenario, what will accomplish this task?
  • Question 8

    You are designing a data center security architecture. The design requires automated scaling of security services according to real-time traffic flows.
    Which two design components will accomplish this task? (Choose two.)
  • Question 9

    Policy Enforcer provides which benefit?
  • Question 10

    You are designing an Internet security gateway (ISG) for your company and are considering a centralized versus a distributed model for ISGs.
    Which two statements are correct in this scenario? (Choose two.)