Question 6 of 368Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports? Question 7 of 368What is the default behavior of an access list on the Cisco ASA security appliance? Question 8 of 368What is the default behavior of NAT control on Cisco ASA Software Version 8.3? Question 9 of 368Which three options are hardening techniques for Cisco IOS routers? (Choose three.) Question 10 of 368Which three commands can be used to harden a switch? (Choose three.)