【单选题】
公路网联网及数据接口技术要求的传输网络性能中错包率的上限值为 ______。 ___
A. 1*10-2
B. 1*10-4
C. 1*10-3
D. 1*10-5
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
高速公路干线传输网为每个路段收费分中心提供______以太网传输通路。___
A. 10/100Mbit/s
B. 10/1000Mbit/s
C. 10Mbit/s
D. 100/1000Mbit/s
【单选题】
______是当今现有局域网采用的最通用的通信协议标准。___
A. 以太网
B. 令牌环网(token ring)
C. FDDI
D. ARCNET
【单选题】
目前河南省高速公路收费站备份路由系统采用的设备型号是______ 。___
A. ICG3000
B. ICG2000
C. ICG4000
D. ICG5000
【单选题】
8、维护人员通过串口访问我省当前使用的备份路由网络设备时,登录终端的波特率要设置为______ 。___
A. 4800
B. 9600
C. 14400
D. 19200
【单选题】
维护人员通过命令行操作我省当前使用的备份路由设备时,从接口视图切回系统视图的命令是______。___
A. exit
B. logout
C. quit
D. shutdown
【单选题】
目前河南省高速公路收费站正在使用的备份路由设备有______个千兆WAN口。___
【单选题】
目前河南省高速公路收费站备份路由设备支持______块SIC卡扩容。___
【单选题】
目前河南省高速公路收费站备份路由设备有______个千兆LAN口。___
A. 2个
B. 8个
C. 10个
D. 11 个
【单选题】
目前河南省高速公路分中心备份路由设备与分中心交换机之间运行______路由协议。___
A. OSPF
B. BGP
C. STATIC
D. RIP
【单选题】
运维人员如果执行display interface brief命令,发现备份路由设备端口状态显示为“ADM”,则应该执行______命令打开该端口。___
A. undo shutdown
B. open
C. no shutdown
D. undo admin
【单选题】
在收费站备份路由设备上携带业务网关(10.1.1.1)ping 省局服务器地址(10.1.2.1)的命令是______。___
A. ping –c 10.1.1.1 10.1.2.1
B. ping –h 10.1.1.1 10.1.2.1
C. ping –s 10.1.1.1 10.1.2.1
D. ping –a 10.1.1.1 10.1.2.1
【单选题】
racert 命令利用IP报文头的字段来实现路径探测。___
A. ttl
B. length
C. tos
D. checksum
【单选题】
收集H3C设备运行的诊断信息的命令是 。___
A. display error
B. display version
C. display diagnostic-information
D. display clock
【单选题】
拥有H3C交换机最高权限的命令级别是______。___
【单选题】
在配置H3C交换机时,如果要使设备自动补全命令,需按下 按键。___
A. SHIFT
B. ENTER
C. TAB
D. CTRL
【单选题】
Telnet使用TCP端口号是______。___
【单选题】
用于局域网网段的网间设备主要有中继器、网桥、路由器和网关,这些设备在局域网对局域网的连接过程中处于OSI参考模型的不同层,路由器在第______层。___
【单选题】
IP地址是一个______位的二进制数。___
【单选题】
视频互联系统网络层应支持____协议,传输层应支持_____和_______协议。___
A. IP 、TCP、 UDP
B. TCP 、IP、 UDP
C. UDP、TCP 、IP
D. IP 、TCP、 LPD
【单选题】
1000BASE-T网络中,系统传输占用______对电缆。___
【单选题】
通信电源交流供电系统应采用______供电系统对通信网络中的各种网管、维护和计费等终端及其他必要设备提供不间断交流供电。___
A. 开关
B. 稳压
C. UPS
D. 参数稳压
【单选题】
气吹敷设光缆时,光缆的输送速度宜控制在___内。___
A. 50m/min
B. 60m/min
C. 70m/min
D. 80m/min
【单选题】
STM-4等级同步传输系统的传输容量是 。(注:国际标准)___
A. 34Mbit/s
B. 155Mbit/s
C. 622Mbit/s
D. 120Mbit/s
【单选题】
传输系统接入网的网管系统应设在 ______处,与局端接入设备相连。___
A. ONU
B. OLT
C. Q3
D. ALC
【单选题】
管道光缆占用的管孔在管群中的位置应遵循______的原则。___
A. 先右后左、先下后上
B. 先左后右、先上后下
C. 先左后右、先下后上
D. 先右后左、先上后下
【单选题】
河南省高速公路视频会议系统采用 标准协议进行组网。___
A. H.320
B. H.321
C. H.322
D. H.323
【单选题】
整流电源根据通信站设备供电负荷的要求计算容量,并按 冗余方式配置。___
A. n
B. n+1
C. n+2
D. n+3
【单选题】
总配线架终期的外线总对数可按局内设备终期容量或用户容量之和的 倍计算。___
A. 1.3~1.5
B. 1.8~2.0
C. 2.3~2.5
D. 2.8~3.0
【单选题】
目前,我省高速公路干线传输网络,核心环网的传输速率等级为 ,各分支环网的传输速率等级为 。___
A. STM-4,STM-4
B. STM-16;STM-16
C. STM-16;STM-4
D. STM-4;STM-16
【单选题】
根据我省要求,高速公路数字传输设备的年完好率应不低于 。___
A. 95%
B. 96%
C. 98%
D. 99%
【单选题】
光分波器和光合波器在光纤通信用光电器件中属于 。___
A. 光发送器件
B. 光波系统互连器件
C. 光接受器件
D. 光电集成器件
【单选题】
电源提供给传输设备的输出功率应该在传输整机标准功耗上增加裕量 。___
A. 20%
B. 30%
C. 40%
D. 50%
【单选题】
目前,河南省高速公路通信系统干线传输网采用的传输模式是 。___
A. SDH
B. OTN
C. MSTP
D. PTN
【单选题】
传输波长中850nm窗口只用于多模传输, 窗口更适合高速率大容量的传输。___
A. 650nm
B. 850nm
C. 1310nm
D. 1550nm
【单选题】
以下关于SDH的特点描述错误的是 。___
A. SDH有标准的光接口规范
B. SDH可以进行灵活的分差复用
C. SDH有很好的自愈能力,提高传输的可靠性
D. SDH采用信息结构等级成为同步传送模块STM-N,最基本的模块为STM-4
【单选题】
综合布线系统光纤信道应采用标称波长为_____nm和_____nm的多模光纤及标称波长为_____nm和______nm的单模光纤。___
A. 850 1300 1310 1550
B. 980 1480 1310 1550
C. 850 1300 1530 1565
D. 1310 1550 850 1300
【单选题】
干线传输网中,宜在距离大于_____的两个干线传输设备增加中继设备REG。___
A. 60km
B. 70km
C. 80km
D. 90km
【单选题】
光纤产生损耗的原因很多,下列哪一项不是其主要类型___
A. 固有损耗
B. 外部损耗
C. 传输损耗
D. 应用损耗
【单选题】
光缆的中继段损耗通常可用______测得。___
A. 光源
B. 光功率计
C. 光时域反射仪(OTDR)
D. 传输分析仪
推荐试题
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen