156-215.80 Exam Question 216
Which of the following is an authentication method used for Identity Awareness?
156-215.80 Exam Question 217
When a policy package is installed, ________ are also distributed to the target installation Security Gateways.
156-215.80 Exam Question 218
Which backup utility captures the most information and tends to create the largest archives?
156-215.80 Exam Question 219
What is the purpose of the Clean-up Rule?
156-215.80 Exam Question 220
Fill in the blanks: There are ________ types of software containers ________.