相关试题
【填空题】
43.1957年10月4日,苏联把世界上第一颗 ___ 送入地球近地轨道.
【填空题】
44.中央军委下属机关有___个部<厅>、___个委员会、___个直属机构。
【填空题】
46.天基武器系统主要指攻击对方航天器用的卫星和卫星平台,包括 ___ 、 ___和___ 等。
【填空题】
47.中国人民解放军海军成立于___年。
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
推荐试题
【判断题】
涉及国家秘密的地图、图纸、图表在其标题之后或者下方标明密级和保密期限。
【判断题】
文件、资料汇编中有密件的,应当对各独立密件的密级和保密期限做出国家秘密标志,并在封面或者首页以其中的最低密级和最短保密期限做出标志。
【判断题】
摘录、引用密件中属于国家秘密的内容,应当以其中最高密级和最长保密期限做出国家秘密标志。
【判断题】
密件的密级和保密期限变更后,应当在原国家秘密标志位置的附近做出新标志,原标志以明显方式废除。
【判断题】
在保密期限内解密的密件,应当以能够明显识别的方式标明解密的字样。
【判断题】
密品应当在壳体及封面、外包装的显著位置标注国家秘密标志,无法在物品本身标注或者不宜做出国家秘密标志的,应当在密品使用维护说明书中标明密级、保密期限和知悉范围,并提出相应的保密措施。
【判断题】
保密工作机构应当组织相关涉密业务部门研究制定本单位《国家秘密事项范围细目》
【判断题】
国家秘密事项的密级和保密期限一经确定,就不能改变。
【判断题】
国家秘密的保密期限,除有特殊规定外,绝密级事项不超过 20 年,机密级事项不超过 10 年,秘密级事项不超过 5 年。
【判断题】
保密期限需要缩短的,由原确定密级和保密期限的机关、单位或者上级机关决定。
【判断题】
保密期限需要延长的,由原确定密级和保密期限的机关、单位或者上级机关决定。
【判断题】
单位领导要求继续保密的事项,在领导要求的期限内不得解密。
【判断题】
企业的技术成果被确定为国家秘密后,在保密期限内不得擅自解密和对外提供。
【判断题】
各级机关和涉密单位编发的内部工作简报都应定为国家秘密。
【判断题】
制作国家秘密载体应当依照有关规定标明密级和保密期限,注明发放范围及制作数量,并编排序号。
【判断题】
纸介质国家秘密载体应当在本机关、本单位内部文印室或者交保密行政管理部门审查批准的单位制作。
【判断题】
国家秘密载体印制资质单位,使用电子方法排版印制或者打印国家秘密载体的,复制完成后其磁盘内的载体内容可以自行删除。
【判断题】
收发国家秘密载体,应当履行清点、登记、编号、签收等手续。
【判断题】
传递国家秘密载体应当密封包装,装载国家秘密载体的信封或者袋牌上应当标明密级、编号和收发件单位名称。
【判断题】
传递国家秘密载体应当通过机要交通、机要通信或指派专人传递,不得通过普通邮政渠道传递
【判断题】
国家秘密文件、资料可以通过普通邮政“特快专递”传送。
【判断题】
不准通过普通邮政、快递传递属于国家秘密的文件、资料和其他物品。
【判断题】
单位收到绝密级载体后应当按照规定的范围组织阅读和使用,并对接触和知悉绝密级国家秘密的人员作出文字记载。
【判断题】
单位内部复制国家秘密载体应当履行审批手续,复制机密级以上国家秘密载体须经部门或单位领导批准,加盖复制戳记,视同原件管理,并进行登记。
【判断题】
因公出差,且两人同行,可以携带密件到购物、餐饮、娱乐等公共场所。
【判断题】
阅读、承办、使用密件,应当在符合保密要求的办公场所进行,严禁擅自携带外出。
【判断题】
传阅秘密公文的人员很多,逐人逐份登记很麻烦,有时可以不登记,收回时自己在文件登记本上画个勾就可以了。
【判断题】
某协作单位工作人员因工作需要借阅协作范围内的绝密级图纸,该单位接待人员电话请示有关领导同意后,就可以为其办理借阅手续。
【判断题】
某领导携带涉密 U 盘参加行业工作会,会议要求报书面材料,因时间紧急,该领导使用涉密 U 盘连接营业性场所计算机打印机密级汇报资料,打印完成后作删除处理即可。
【判断题】
某单位进行文件汇编工作时,少量摘抄某涉密文件,经办人员认为该文件汇编册不涉密,可不标注密级。
【判断题】
涉密人员参加会议带回的秘密文件、资料,应交本单位文秘部门登记、管理。
【判断题】
阅读和使用国家秘密载体应当办理登记、签收手续,管理人员应当随时掌握国家秘密载体的去向。
【判断题】
传达国家秘密事项时,凡不准记录、录音、录像的,应当事先申明。
【判断题】
普通手机处于关机状态下,不存在泄密隐患。
【判断题】
不得使用普通手机短信传送国家秘密信息。
【判断题】
不得使用普通手机中微信、QQ等社交软件谈论、传递国家秘密。