What is the order of the first path packet processing when a packet enters a device?
What are two valid address books? (Choose two.)
What is the order in which malware is detected and analyzed?
Which two UTM features should be used for tracking productivity and corporate user behavior? (Choose two.)
Which two security features inspect traffic at Layer 7? (Choose two.)