On what is the Cisco security approach based?
A.
deployment of traditional security architecture that eliminates cyber threats within a
campus or branch
B.
the inability of cyber criminals to exploit zero-day vulnerabilities
C.
attack lifecycle
D. first-hop security