【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
推荐试题
【单选题】
[36][单选]绝缘隔板和绝缘罩用于10(6)kV电压等级时,绝缘隔板和绝缘罩的厚度不应小于___mm。
【单选题】
[37][单选]钢丝绳直径为38~45mm时,固定用绳卡数量最少要___个。
【单选题】
[38][单选]工作许可后,工作负责人应向工作班成员交待工作内容、人员分工、带电部位等危险点和现场安全措施,进行危险点告知,并___。
A. :逐一确认
B. :书面记录
C. :现场确认
D. :履行确认手续
【单选题】
[39][单选]基层岗位应按___开展安全风险识别。
A. :作业活动步骤
B. :设备逐台
C. :设备性能
D. :设备状态
【单选题】
[40][单选]参与本单位电气工作的外来工作人员在工作前,设备运行管理单位应告知现场电气设备运行状况、危险点和___。
A. :安全措施
B. :技术措施
C. :应急预案
D. :安全注意事项
【单选题】
[41][单选]任何人员发现有违反本规程的行为,应立即___
A. :报告
B. :制止
C. :批评
D. :采取措施
【单选题】
[42][单选]新入厂员工应接受___安全教育
A. :二级
B. :三级
C. :四级
D. :班组
【单选题】
[43][单选]作业机具和安全工器具库房(工具柜)应经常保持干燥、通风,温度为___、相对湿度为80%以下。
A. :-5℃~+30℃
B. :-10℃~+30℃
C. :-10℃~+35℃
D. :-15℃~+35℃
【单选题】
[44][单选]___是指危害和整改难度较小,发现后能够立即整改排除的隐患。
A. :一般事故隐患
B. :重大事故隐患
C. :较大事故隐患
D. :严重事故隐患
【单选题】
[45][单选]110kV 同杆塔多回线路中部分线路停电作业,应满足___的安全距离要求。
A. :0.7m
B. :1.0m
C. :1.5m
D. :3.0m
【单选题】
[46][单选]工作人员体格检查至少每___年一次。
【单选题】
[47][单选]经核对停电作业线路的名称和杆号无误,___方可登杆塔作业。
A. :工作负责人
B. :工作许可人
C. :工作人员
D. :专责监护人
【单选题】
[48][单选]在禁火区、易燃易爆场所等规定区域内进行用火作业,均应按所在作业区主管单位的规定办理___手续。
A. :作业票证
B. :临时用电
C. :用火许可
D. :现场确认
【单选题】
[49][单选]临时接地体埋深不应小于 ___ m。
A. :.6
B. :.7
C. :.8
D. :.9
【单选题】
[50][单选]电缆不需要停电工作应填写___工作票
A. :电力线路第一种
B. :电力线路第二种
C. :带电作业票
D. :事故抢修
【单选题】
[51][单选]如实对从业人员进行职业病危害告知,要在劳动合同中明确告知职业病危害情况。作业场所按规定设置职业病危害___。
A. :安全标识
B. :警示标识
C. :黄色标识
D. :绿色标识
【单选题】
[52][单选]以下非填用第一种工作票的工作是___
A. :需要线路全部停电或部分停电的工作
B. :需要配电设备全部停电或部分停电的工作
C. :电力电缆需要停电的工作
D. :运行中的配电设备上的工作
【单选题】
[53][单选]下列不属于工作票签发人安全责任的是___
A. :确认工作必要性和安全性
B. :确认工作票上所填安全措施正确完备
C. :确认所派工作负责人和工作班人员适当、充足
D. :正确安全地组织工作
【单选题】
[54][单选]设备管理“四懂三会”中的“三会”是指会使用、会保养、___。
A. :会操作
B. :会修理
C. :会排除故障
D. :会原理
【单选题】
[55][单选]10kV带电线路杆塔上工作与带电导线的最小安全距离为___m。
A. :.7
B. :1
C. :1.5
D. :3
【单选题】
[56][单选]以下非填用第二种工作票的工作是___
A. :需要线路全部停电或部分停电的工作
B. :带电线路杆塔上与带电导线的安全距离符合规定的工作
C. :电缆不需要停电的工作
D. :运行中的配电设备上的工作
【单选题】
[57][单选]钢丝绳直径为28~37mm时,固定用绳卡数量最少要___个。
【单选题】
[58][单选]电缆施工完成后应将穿越过的孔洞进行封堵。进入电缆工井、控制柜、开关柜等处的电缆孔洞,应用___封闭。
A. :金属材料
B. :防火材料
C. :灌浆方式
D. :泡沫材料
【单选题】
[59][单选]工作人员不应擅自变更工作票中指定的接地线位置,如需变更,应由工作负责人征得___同意,并在工作票上注明变更情况。
A. :带班领导
B. :工作票签发人
C. :专责监护人
D. :工作许可人
【单选题】
[60][单选]事故隐患确认和治理实行___,定期不定期的确认、销号。
A. :动态管理
B. :严格管理
C. :台帐管理
D. :专人管理
【单选题】
[61][单选]钢丝绳直径为19~27mm时,固定用绳卡数量最少要___个。
【单选题】
[62][单选]重大风险及较大风险为不可接受风险;一般风险为___;低风险为广泛可接受风险。
A. :有条件可接受风险
B. :可接受风险
C. :不可接受风险
D. :无条件可接受风险
【单选题】
[63][单选]设备管理“四懂三会”中的“四懂”是指___、懂性能、懂原理、懂用途。
A. :懂结构
B. :懂保养
C. :懂使用
D. :懂操作
【单选题】
[64][单选]在交叉档内松紧、降低或架设导(地)线的工作,只有停电作业线路在___下面时方可进行。
A. :带电电缆
B. :带电线路
C. :绝缘线路
D. :防护线路
【单选题】
[65][单选]工作人员有权拒绝___和强令冒险作业。安全措施不正确完备的有权拒绝作业。
A. :上级命令
B. :违章指挥
C. :电调指令
D. :工作负责人安排
【单选题】
[66][单选]操作机械传动的断路器或隔离开关时,应戴___。
A. :安全帽
B. :线手套
C. :护目眼镜
D. :绝缘手套
【单选题】
[67][单选]杆塔施工中,顶杆及叉杆只能用于竖立 ___以下的拔稍杆,不得用铁锹、桩柱等代用。
A. :6m
B. :7m
C. :8m
D. :10m
【单选题】
[68][单选]线路电压等级为110kV时,绝缘操作杆的有效绝缘长度不应小于___m。
A. :1.3
B. :1.4
C. :1.5
D. :1.6
【单选题】
[69][单选]线路电压等级为35kV时,绝缘操作杆的有效绝缘长度不应小于___m。
A. :.8
B. :.9
C. :1
D. :1.2
【单选题】
[70][单选]整体立、撤杆塔前应检查各受力和联接部位全部合格方可起吊。杆顶起立离地约 ___时,应对杆塔进行一次冲击试验,检查各受力部位确无问题方可继续起立。
A. :0.5m
B. :0.6m
C. :0.7m
D. :0.8m
【单选题】
[71][单选]风险控制措施确定后,应对相关管理和操作人员进行___,确保措施落实到位。
A. :培训和技术交底
B. :检查
C. :说明
D. :考试
【单选题】
[72][单选]在居民区及交通道路附近开挖的基坑,应设坑盖、安全网或遮栏,加挂警示牌,夜间宜设置___。
A. :警示带
B. :警示光源
C. :照明灯
D. :应急电源
【单选题】
[73][单选]潜水泵工作时,泵的周围 ___以内水面不应有人进入。
A. :15m
B. :20m
C. :30m
D. :40m
【单选题】
[74][单选]填写___的工作,不必履行工作许可手续
A. :第一种工作票
B. :第二种工作票
C. :口头或电话命令
D. :带电作业票
【单选题】
[75][单选]运用中的电气设备是指全部带有电压、一部分带有电压或___即带有电压的电气设备。
A. :一经合闸
B. :一经触碰
C. :一经靠近
D. :一经操作