相关试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
推荐试题
【多选题】
储蓄国债均为代销,发行期结束后,未销售储蓄国债可退还给( )。___
A. 财政部
B. 金融办
C. 中国人民银行
D. 国资委
【多选题】
客户在办理普通定投申购(普通定申)时,需要完成( ).___
A. 基金签约
B. 普通定申签约
C. 开通所申请基金的TA账户
D. 理财签约
【多选题】
下列哪些基金定投要素可以修改( )___
A. 委托金额
B. 委托份额
C. 委托日
D. 截止日期
【多选题】
客户在柜台进行国债购买,柜面经理审核客户资料并核实身份信息无误后进入“51100国债购买”交易,提交系统处理后,需打印( )凭证。___
A. 《凭证式国债收款凭证》
B. 《业务凭证》A4
C. 《个人业务凭证》
D. 《债券业务凭证》
【多选题】
投资人购买凭证式国债,其计息方式为( )。___
A. 自购买之日起计息
B. 按实际天数计息
C. 不计复利
D. 计复利
【多选题】
电子式国债非交易过户需提供以下哪些资料( )。___
A. 过出方有效身份证件,过入方申请办理的,须出示过出方和过入方的有效身份证件
B. 过出方资金结算账户
C. 过入方账号
D. 赠予、继承及其他情形非交易过户提供相关证明材料
【多选题】
在基金确权时,单位客户持( )办理业务。___
A. 营业执照或注册登记证书副本原件、加盖单位公章的营业执照或注册登记证书的复印件 (以上二者需提供其一)
B. 加盖单位公章和法定代表人或授权人章的基金业务授权委托书原件
C. 被授权人身份证件原件
D. 证券账户原件
【多选题】
“传世之宝”的报价单位为( ),( )以下保留两位小数。___
A. 人民币元/克
B. 人民币元/盎司
C. 元
D. 美元/盎司
【多选题】
各级行按“传世之宝”( )等分别在贵金属系统中开立表外账户。___
A. 品种
B. 规格
C. 破损标记
D. 正常
【多选题】
向单位客户销售“传世之宝”产品,必须以( )方式进行,经办人须提供有效身份证件。___
A. 现金
B. 单位借记卡
C. 转账方式
D. 开立现金支票
【多选题】
“传世之宝”业务包括( )和( )两种交易方式。___
A. 实物买卖
B. 积存账户买卖(存金通业务)
C. 期货交易
D. 延期期货交易
【多选题】
已签约“双利丰”个人通知存款的客户,可以通过重复签约修改( )等条件。___
A. 留存金额
B. 转存金额
C. 起存金额
D. 最低转存金额
【多选题】
个人自动转账业务转账方式包括( )。___
A. 指定金额
B. 留存金额差额
C. 留存金额差额取整
D. 补足余额
【多选题】
个人自动转账费用包括( )。___
A. 汇划费
B. 签约费
C. 转账手续费
D. 邮电费
【多选题】
个人自动转账业务系统功能包括( )。___
A. 自动转账签约管理
B. 自动转账关系管理
C. 自动转账公共管理
D. 自动转账维护管理
【多选题】
自动转账签约管理包括( )。___
A. 自动转账签约
B. 自动转账解约
C. 查询自动转账签约信息
D. 更换自动转账账户
【多选题】
个人客户办理“聪明账”增值账户业务需本人或者代理人到营业网点办理,且提供的资料包括( )。___
A. 本人有效身份证件原件
B. 代理人须持代理人和被代理人有效身份证件原件
C. 本人(或被代理人)金穗借记卡
D. 签订《中国农业银行“聪明账”增值账户业务协议》,一式两份
【多选题】
“聪明账”增值账户业务是将客户的个人( )和( )以系统联系起来,进行科学管理,以增加客户收益的一项理财业务。___
A. 活期存款账户
B. 零存整取定期账户
C. 整存整取存款定期子账户
D. 通知存款账户
【多选题】
个人资金归集入账方式分为( )。___
A. 多笔入账
B. 单笔入账
C. 指定笔数入账
D. 汇总入账
【多选题】
“整存整取加息智能转存”业务中合理转存天数的计算由( )决定。___
A. 旧定期利率
B. 新定期利率
C. 新活期利率
D. 存期
【多选题】
客户可以通过( )签约“整存整取加息智能转存”。___
A. 整存整取存单
B. 定期一本通
C. 金穗借记卡
D. 活期一本通
【多选题】
“整存整取加息智能转存”重新存入的账户( )发生相应的改变,存款原账号不改变。___
A. 账户余额
B. 利率
C. 起息日
D. 到期日
【多选题】
“整存整取加息智能转存”业务中转存时重新存入的账户余额为( )之和。___
A. 提前支取的存款账户余额
B. 原定期存款账户余额
C. 提前支取的税后活期利息
D. 提前支取的账户本息和
【多选题】
“聪明账”增值账户明细查询可以查询到( )等明细。___
A. 自动约转子账户明细
B. 便捷消费子账户冻结明细
C. 便捷消费子账户消费明细
D. 便捷消费子账户销转明细
【多选题】
个人资金归集签约业务办理成功后,需交还客户的相关资料包括( )等。___
A. 业务回单第二联
B. 《个人资金归集业务协议书》第二联
C. 收费凭证
D. 身份证件原件
【多选题】
确认资金归集关系交易办理成功后,需专夹保管的相关资料包括( )等。___
A. 《个人资金归集子账户扣款授权书》第一联
B. 业务回单第一联
C. 《个人资金归集子账户扣款授权书》第二联
D. 身份证复印件
【多选题】
凡因( )或其他目的需要开具资信证明的居民个人和非居民个人,均可向我行开办个人存款证明业务的营业机构申请办理。___
A. 出国留学
B. 探亲
C. 旅游
D. 移民定居
【多选题】
个人存款证明仅作为客户本人在银行个人金融资产的证明,( )或作其它用途,也不能作为办理支取的凭据。___
A. 可以质押
B. 不得转让
C. 不得为他人担保或作其他用途
D. 不能挂失
【多选题】
可用于开具个人存款证明的个人金融资产包括:( )等。___
A. 本外币定活期储蓄存款
B. 凭证式国债
C. 储蓄国债
D. 中低风险的个人理财产品
【多选题】
周末及法定节假日不办理存金通定投业务的( )。___
【多选题】
存金通非交易过户是指因( )等原因进行的贵金属份额的所有权转移。___
A. 遗产继承
B. 转让
C. 出售
D. 赠与
【多选题】
经办人员进入存金通销售交易,录入( ),审核无误后提交系统处理。___
A. 账户金代码
B. 销售重量
C. 选择客户级别
D. 销售价格
【多选题】
经办人员办理存金通销售、购回、提货等交易时,若因柜面经理操作失误、在交易系统中录入错误,在尚未同投资者进行实物黄金交割或资金收付前,报三级主管同意后可以通过柜面经理撤销交易进行撤销。本交易( )进行。___
A. 可跨日
B. 不可跨日
C. 可跨柜面经理
D. 不可跨柜面经理
【多选题】
BoEing投资理财业务客户签约时可以选择开通渠道。除系统默认的渠道外,个人可以开通的渠道包括( )。___
A. 电话银行
B. 网银渠道
C. 掌上银行
D. 自助机具
【多选题】
签约天天利滚利及半开放式产品做自动理财时,需客户选择( )作为申购周期。___
【多选题】
可以修改的自动理财签约主要信息有( )。___
A. 最低留存金额
B. 单笔最高限额
C. 理财产品
D. 申购周期
【多选题】
理财产品购买交易包括( )。___
A. 认购
B. 申购
C. 申购预申请
D. 回购
【多选题】
个人客户可在( )进行风险承受能力评测。___
A. 网银端
B. 电话银行
C. 掌上银行端
D. 柜面端
【多选题】
目前对公“双利丰”可签约活期账户类型包括( )。___
A. 基本户
B. 一般户
C. 临时户
D. 专用户
【多选题】
对公双利丰最低起存金额为等值人民币( )万元(含)以上,且原则上要求子账户最低汇总金额不得低于等值人民币( )万元。___
A. 10万元
B. 50万元
C. 500万元
D. 5000万元