What does remote access use to verify identity?
How should partners leverage Cisco’s award-winning resources and support to help customers?
What are two reasons perimeter-based network security is no longer sufficient? (Choose two.)
In which two areas are Cisco’s unmatched environment protection demonstrated by its long-standing experience? (Choose two.)
Which two security areas are part of Cisco’s cloud solutions? (Choose two.)
What are the two tenants of establishing an SD-perimeter? (Choose two.)