1.
Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four.)
2.
What Cisco IOS feature prevents an attacker from filling up the MTU cache for locally generated traffic when using path MTU discovery?
3.
What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?
4.
If an ASA device is configured as a remote access IPsec server with RADIUS authentication and password management enabled, which type of authentication will it use?
5.
What SNMPv3 command disables descriptive error messages?
6.
Which statement about SNMP control plane policing is true?
7.
What IPS form factor is best suited to handling heavy traffic between virtualized servers in a data center?
8.
When you configure an ASA with RADIUS authentication and authorization, which attribute is used to differentiate user roles?
9.
Which statement is true about SYN cookies?
10.
Which protocol is an extension to SSH 2.0 that provides security for data traffic?