Which three Cisco solutions are covered in the Advanced Threat module? (Choose three.)
Which two options are attack vectors protected by Identity and Access Control? (Choose two.)
Which is a security product that was covered in the Policy and Access security module?
Which three features provided by NGFW and NGIPS support the “Internet Edge” use case? (Choose three.)