1.
When you are configuring QoS on the Cisco ASA appliance, which four are valid traffic selection criteria? (Choose four.)
2.
Which command is required in order for the Botnet Traffic Filter on the Cisco ASA appliance to function properly?
3.
Which four configuration steps are required to implement a zone-based policy firewall configuration on a Cisco IOS router? (Choose four.)
4.
Which Cisco IPS appliance signature engine defines events that occur in a related manner, within a sliding time interval, as components of a combined signature?
5.
Which four techniques can you use for IP data plane security? (Choose four.)
6.
As defined by Cisco TrustSec, which EAP method is used for Network Device Admission Control authentication?
7.
During the establishment of an Easy VPN tunnel, when is XAUTH performed?
8.
A frame relay PVC at router HQ has a CIR of 768 kb/s and the frame relay PVC at router branch office has a CIR of 384 kb/s. Which QoS mechanism can best be used to ease the data congestion and data loss due to the CIR speed mismatch?
9.
The IETF is a collaborative effort by the international community of Internet professionals to improve the design, use, and management of the Internet. Which international organization charters the activity of IETF?
10.
Which RFC outlines BCP 84?