On what is the Cisco security approach based?

A.
deployment of traditional security architecture that eliminates cyber threats within a
campus or branch
B.
the inability of cyber criminals to exploit zero-day vulnerabilities
C.
attack lifecycle
D. first-hop security