Which attack vector needs protection across the extended enterprise?
A.
VPN tunnels
B.
encrypted traffic
C.
network, endpoint, mobile, virtual, and cloud environment
D.
vulnerable Windows hosts
Which attack vector needs protection across the extended enterprise?
Which attack vector needs protection across the extended enterprise?
A.
VPN tunnels
B.
encrypted traffic
C.
network, endpoint, mobile, virtual, and cloud environment
D.
vulnerable Windows hosts