Question 6 of 368
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
Correct Answer: B

Question 7 of 368
What is the default behavior of an access list on the Cisco ASA security appliance?
Correct Answer: C

Question 8 of 368
What is the default behavior of NAT control on Cisco ASA Software Version 8.3?
Correct Answer: A

Question 9 of 368
Which three options are hardening techniques for Cisco IOS routers? (Choose three.)
Correct Answer: A, C, D

Question 10 of 368
Which three commands can be used to harden a switch? (Choose three.)
Correct Answer: B, D, F