On what is the Cisco security approach based?
A. attack lifecycle
B. first-hop security
C. the inability of cyber criminals to exploit zero-day vulnerabilities
D. deployment of traditional security architecture that eliminates cyber threats within a campus or branch