Question 6 of 368

Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
Answer

Suggested Answer

The suggested answer is B.

Question 7 of 368

What is the default behavior of an access list on the Cisco ASA security appliance?
Answer

Suggested Answer

The suggested answer is C.

Question 8 of 368

What is the default behavior of NAT control on Cisco ASA Software Version 8.3?
Answer

Suggested Answer

The suggested answer is A.

Question 9 of 368

Which three options are hardening techniques for Cisco IOS routers? (Choose three.)
Answer

Suggested Answer

The suggested answer is A, C, D.

Question 10 of 368

Which three commands can be used to harden a switch? (Choose three.)
Answer

Suggested Answer

The suggested answer is B, D, F.