相关试题
【单选题】
组织我国社会审计准则的主要层次是独立审计基本准则、独立审计具体准则、独立审计实务公告、执业规范指南。___
【单选题】
审计人员对收集的审计证据的真实性、相关性和重要性进行考察的是审计证据的综合阶段。___
【单选题】
在独立审计准则体系中,执业规范指南对注册会计师执行审计业务不具有强制性___
【单选题】
审计机关对国际组织和外国政府援助、贷款项目的财务收支进行审计监督。___
【单选题】
社会审计机构实行无偿服务、自收自支、独立核算,依法纳税,并接受国家审计机关的指导、监督和管理。___
【单选题】
我国的审计机构包括:国家审计机关、内部审计机构和社会审计机构。___
【单选题】
被审计单位违反《审计法》规定,拒绝或者拖延提供与审计事项有关的资料的,或者提供的资料不真实的,由审计机关责令改正。___
【单选题】
《审计法》规定,国家实行审计监督制度。国务院和县级以上人民政府设立审计机关___
【单选题】
社会审计机构的审计活动不是依职权而产生,而是依委托而产生。___
【单选题】
审计机关之间对审计管辖范围有争议的,由其共同的上级审计机关确定。___
【单选题】
某单位的国有资产属中央部门监督管理的,由审计署审计管辖;属地方部门监督管理的,由地方审计机关审计管辖。___
【单选题】
上级审计机关对下级审计机关审计管辖范围内的重大审计事项,可以直接进行审计。___
【单选题】
对法定的政府审计监督对象来讲,其内部审计在相当程度上是国家审计的延伸。___
【单选题】
审计人员进行肯定式函证时,如果没有收到回函,应进行分析性复核。___
【单选题】
内部审计人员工作的独立性,不应包括独立地接受委托。___
【单选题】
具体审计目标中的“分类”目标,是由被审计单位管理当局关于表达与披露的认定推论得出的。___
【单选题】
对被审计单位是否实施后续审计,决定权在于审计人员。___
【单选题】
我国第一个独立的审计机构是隋朝的“比部”。___
【单选题】
最能体现审计鉴证职能的是国家审计。___
【单选题】
管理审计的内容包括评价企业的经营效益。___
【单选题】
所有者权益审计应采用详细审计法。___
【单选题】
就社会审计而言,终结阶段最后一项工作是对审计报告进行审批。___
【单选题】
如果审计人员认为错报属于重要错报,就应考虑通过扩大审计程序或请求管理当局调整会计报表来降低审计风险。___
【单选题】
总体审计计划的基本内容不应包括审计工作底稿索引号。___
【单选题】
现代审计实务中,最能体现审计评价职能的是财务审计。___
【单选题】
审计业务约定书基本内容有审计责任、审计收费、审计范围。___
【单选题】
实质性测试的时间、性质和范围的确定依据是符合性测试的结果。___
【单选题】
审计人员对审计项目相关内部控制情况进行调查所获取的证据属于内部证据。___
【单选题】
独立审计基本准则中的一般准则包括注册会计师保持独立的观念与态度。___
【单选题】
为减少重复的审计程序,审计人员在选择所需执行的审计程序时,应综合考虑审计程序的成本效益和重要性。___
【单选题】
在社会审计的审计业务约定书中,保证会计资料的真实、合法、完整不属于审计人员审计责任。___
【单选题】
初步分析审计风险是属于审计实施阶段工作内容的。___
【单选题】
审计产生和发展的客观依据是维系受托经济责任关系。___
【单选题】
社会审计产生的原因,最根本的是股份有限公司所有权与经营权分离,股东对股份有限公司债务的清偿责任以认购的股份金额为限。___
【单选题】
隋唐年间设立的,使审计工作开始走向专业化的是理藩院。___
【单选题】
审计过程中若发现错误和舞弊,审计证据的数量应增加。___
【单选题】
审计人员属于国家工作人员,可以不用具备与其从事的审计工作相适应的专业知识和业务能力,因而国家实行审计人员专业技术资格制度。___
【单选题】
有证据证明被审计单位以个人名义存储公款的,经县级以上人民政府审计机关主要负责人批准,审计机关有权查询被审计单位以个人名义在金融机构的存款。___
【单选题】
地方各级审计机关正职和副职负责人的任免,应当先征求上一级审计机关的意见。___
【单选题】
审计人员滥用职权、徇私舞弊、玩忽职守或者泄露所知悉的国家秘密、商业秘密的,依法给予处分。___
推荐试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key