Which two security techniques are important to implement a secured management network that is used to access the management plane of a Cisco APIC cluster? (Choose two.)
E. route maps
Explanation: The Cisco APIC-EM should never be directly connected to the Internet. It should not be deployed outside of a NAT configured or protected datacenter environment.
Each contract is defined by a name and by filters (ACLs). Filters are a collection of layer 4 protocol and ports.