DRAG DROP Drag and drop the NetFlow export formats from the left onto the descriptions on the right. Select and Place:

DRAG DROP Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right. Select and Place:

DRAG DROP Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right. Select and Place:

DRAG DROP Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right. Select and Place:

Drag Drop Drag and drop the common security threats from the left onto the definitions on the right. Select and Place:

DRAG DROP Drag and drop the threats from the left onto examples of that threat on the right. Select and Place:

DRAG DROP Drag and drop the descriptions from the left onto the correct protocol versions on the right. Select and Place:

DRAG DROP Drag and drop the capabilities from the left onto the correct technologies on the right. Select and Place: