Which two threat.defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
A.
proactive threat response
B.
control of data transmission
C.
application security
D.
network containment and control
Which two threat.defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
Which two threat.defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
A.
proactive threat response
B.
control of data transmission
C.
application security
D.
network containment and control