Question 11
Which two attack vectors are protected by Cloud Security? (Choose Two)
Question 12
Which three options ate attack vectors protected by DNS-Layer security? (Choose three.)
Question 13
Which are two features of Cisco FirePOWER NGFW? (Choose two.)
Question 14
What do customers receive when implementing TrustSec?
Question 15
What are two key capabilities of Meraki? (Choose two.)
