1.
What Context-Based Access Control (CBAC) command sets the maximum time that a router running Cisco IOS will wait for a new TCP session to reach the established state?
2.
What action can you take to prevent an amplification attack on an IPv6 network?
3.
What message does the TACACS+ daemon send during the AAA authentication process to request additional authentication information?
4.
How can the tail drop algorithm support traffic shaping when the queue is filled?
5.

You have configured an authenticator switch in access mode on a network configured with NEAT. What RADIUS attribute must the ISE server return to change the switch's port mode to trunk?
6.
What are four technologies that can be used to trace the source of an attack in a network environment with multiple exit/entry points? (Choose four.)
7.
What Protocol provides security for datagram protocols?
8.
What command can you use to protect a router from TCP SYN-flooding attacks?
9.
What is the effect of the Cisco Application Contra Engine (ACE) command ipv6 fragment min- mtu 1024?
10.
All of these are available from cisco IPS Manager (cisco IDM) except which one