The Cisco Email Security Appliance can be managed with both local and external users of different privilege levels. What three external modes of authentication are supported? (Choose three.)
Which two statements about transparent firewall are true? (Choose two.)
Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices?
Which three compliance and audit report types are available in Cisco Prime Infrastructure? (Choose three.)
Cisco Security Manager can manage which three products? (Choose three.)
An engineer is configuring Cisco ASA 1000V Cloud Firewall. Which element allows for application of a security policy based on a class of VMs instead of based onIP addresses?