Which two questions should you ask when assessing an organization's security needs? (Choose two.)
Which three of the following are valid steps when building an architectural roadmap for a customer? (Choose three.)
Which four of the following are included in the SBA toolset? (Choose four.)?
Which three are valid Cisco VPN design options for teleworkers? (Choose three.)
Which three of the following statements are correct regarding security features available on Cisco Catalyst switches? (Choose three.)