Which two attack vectors are protected by MFA? (Choose two.)
Correct Answer:DE
What are two solutions Cisco offers for email security? (Choose two.)
Correct Answer:AC
What two areas present a security challenge for customers? (Choose two.)
Correct Answer:DE
How do AMP's device trajectory capabilities help address customers' breach remediation issues?
Correct Answer:A
What are two tenants of establishing an SD-perimeter? (Choose two.)
Correct Answer:AB