【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
推荐试题
【单选题】
为气管插管病人做口腔护理以下哪项是错误的___
A. 不合作患者需一人协助固定气管导管
B. 口腔护理前放出气囊内的气体
C. 教会患者用手势表达不适
D. 根据病情选择合适的口腔护理液
E. 禁止漱口
【单选题】
口腔护理时,对长期使用抗生素者,应注意观察___
A. 口腔有无粘膜溃疡
B. 口腔有无真菌感染
C. 口唇是否干裂
D. 有无口腔异味
E. 牙龈有无肿胀出血
【单选题】
以下患者不需要进行特殊口腔护理的是___
A. 高热患者
B. 昏迷患者
C. 下肢外伤患者
D. 危重患者
E. 禁食患者
【单选题】
肛管排气一般取___
A. 右侧卧位
B. 半坐卧位
C. 左侧卧位
D. 强迫卧位
E. 头高脚底位
【单选题】
肛管排气时肛管停留多长时间为宜___
A. 20min
B. 25min
C. 30min
D. 35min
E. 40min
【单选题】
下列灌肠的卧位正确的是___
A. 大量不保留灌肠取右侧卧位
B. 大量不保留灌肠取半坐卧位
C. 慢性痢疾者取右侧卧位
D. 阿米巴痢疾者取右侧卧位
E. 清洁灌肠取头高足低位
【单选题】
为伤寒患者行大量不保留灌肠时,其灌肠液量及液面与肛门的距离是___
A. 1000ml,不超过50cm
B. 1000ml,不超过30cm
C. 500ml,不超过20cm
D. 500ml,不超过30cm
E. 500ml,不超过60cm
【单选题】
下列可实施大量不保留灌肠的适应症是___
A. 中暑病人
B. 心梗病人
C. 急腹症病人
D. 消化道出血病人
E. 妊娠早期病人
【单选题】
下列不是大量不保留灌肠适应症的是___
A. 为便秘者软化、清除粪便
B. 急腹症病人的肠道准备
C. 分娩者的肠道准备
D. 腹腔手术前的准备
E. 为高热病人降温
【单选题】
保留灌肠时,肛管插入肛门长度约___
A. 7-10ml
B. 10-15ml
C. 15-20ml
D. 20-25mlml
E. 30ml
【单选题】
大量不保留灌肠时,肛管插入肛门的长度约___
A. 7-10ml
B. 10-15ml
C. 15-20ml
D. 20-25mlml
E. 30ml
【单选题】
灌肠时溶液受阻,应采取的措施是___
A. 拔出肛管
B. 可稍转动肛管
C. 将肛管往前插入少许
D. 嘱患者更换体位
E. 嘱患者深呼吸
【单选题】
为阿米巴痢疾患者行保留灌肠,取右侧卧位的目的是___
A. 减轻不良反应
B. 使病人舒适
C. 提高治疗效果
D. 便于护士操作
E. 促进药物排出
【单选题】
鼻导管给氧,导管插入长度为___
A. 鼻尖至耳垂
B. 鼻尖至耳垂的1/2
C. 鼻尖至耳垂的1/3
D. 鼻尖至耳垂的2/3
E. 鼻翼至耳垂
【单选题】
下列情况那项不是缺氧的主要临床表现___
A. 烦躁不安,脉搏增快
B. 喘息、鼻翼煽动
C. 四肢末梢紫绀
D. 血压下降
E. 神志不清
【单选题】
停用氧气的正确方法是___
A. 关紧总开关→关闭流量表→取下鼻导管→重开流量表放余气
B. 关紧总开关→取下鼻导管→关流量表
C. 取下鼻导管→关紧总开关→关流量表
D. 关紧流量表→关总开关→取下鼻导管→重开流量表放余气
E. 取下鼻导管→关流量表→关总开关→重开流量表放余气
【单选题】
在用氧过程中,需要调节氧流量,应采取的方法是___
A. 拔出鼻导管调节氧流量
B. 直接调节
C. 分离鼻导管调节
D. 更换粗鼻导管并加大氧流量
E. 更换流量表
【单选题】
下列哪项不是氧中毒的临床表现___
A. 体温升高
B. 恶心
C. 烦躁不安
D. 胸骨下不适
E. 呼吸增快
【单选题】
换药用过的器械处理是___
A. 先清洁后浸泡消毒再灭菌
B. 先清洁后灭菌
C. 先浸泡消毒后清洗再灭菌
D. 先浸泡消毒后清洗
E. 先灭菌后清洗
【单选题】
为防止交叉感染应安排下列哪一位病人首先换药___
A. 压疮创面
B. 下肢慢性溃疡
C. 脓肿切开引流术
D. 清创缝合后拆线
E. 下肢开放性损伤
【单选题】
手臂开放性损伤后20h就诊,局部处理应___
A. 伤口不清创,换药
B. 清创后不予缝合
C. 清创后延期缝合
D. 清创后一期缝合
E. 以上都不对
【单选题】
关于糖尿病引起血糖升高的机制,说法错误的是___
A. 组织对葡萄糖的利用减少
B. 糖异生增多
C. 糖异生减少
D. 糖原分解增多
E. 糖原合成减少
【单选题】
标准化的OGTT,抽血的正确顺序是___
A. 服75g葡萄糖前,服糖后30min,60min,120min,180min
B. 服75g葡萄糖前,服糖后30min,60min,90min,
C. 服75g葡萄糖后,服糖后30min,60min,120min,
D. 服75g葡萄糖欠,服糖后1h,2h.3h
E. 服75g葡萄糖后1h,2h,3h,4h
【单选题】
给药原则描述错误的是___
A. 根据医嘱给药,一般情况下不执行口头医嘱
B. 给药过程中对医嘱或药物有疑问时,询问明确后方可给药
C. 准备好的药物应按时分发
D. 必须做好三查七对一注意
E. 凡发生过敏反应的药物应暂停使用
【单选题】
宜在饭前服用的药物是___
A. 维生素C
B. 止咳合剂
C. 多酶片
D. 胃蛋白酶合剂
E. 氨茶碱
【单选题】
服磺胺类药时多饮水的目的是___
A. 避免损害造血系统
B. 减轻服药引起的恶心
C. 避免尿中结晶析出
D. 避免影响血液酸碱度
E. 增加药物疗效
【单选题】
服用洋地黄药物时,护士应重点观察___
A. 胃肠道反应
B. 是否成瘾
C. 心率、心律
D. 体温
E. 皮肤反应
【单选题】
指导患者服药,正确的是___
A. 维生素C不宜与磺胺类药物同服
B. 胃蛋白酶应饭后服
C. 吗丁啉应饭前1小时服用
D. 胃舒平宜饭后嚼碎后服用
E. 服用止咳糖浆后应多饮水
【单选题】
静脉输液发生空气栓塞应立即让病人采取的卧位是___
A. 直立位
B. 右侧卧位
C. 左侧卧位及头低足高位
D. 半坐卧位
E. 头高足低位
【单选题】
2000ml的液体要求在10小时内匀速输完,滴速应该是___
A. 30滴/分
B. 40滴/分
C. 50滴/分
D. 55滴/分
E. 60滴/分
【单选题】
下列哪项不是大量输血的反应___
A. 心脏负荷过重
B. 出血倾向
C. 高血钙
D. 枸橼酸钠中毒反应
E. 酸碱平衡失调
【单选题】
发生溶血反应时,护士应立即___
A. 停止输血,保留余血
B. 通知医师和家属
C. 热敷要不,静脉注射碳酸氢钠
D. 控制感染,纠正水电解质紊乱
E. 安慰患者
【单选题】
血液病人适宜输___
A. 白蛋白
B. 新鲜血
C. 库存血
D. 血浆
E. 水解蛋白
【单选题】
血标本采集时,错误的是___
A. 血清标本应防止试管内凝血
B. 血气分析应备干燥注射器和肝素抗凝
C. 血糖标本应空腹采集
D. 血培养标本应在使用抗生素前采集
E. 内加抗凝剂的血标本应充分摇匀
【单选题】
静脉抽血时以下处理不妥的是___
A. 在抽血时要询问病人感受
B. 当病人出汗、面色苍白时,应立即停止抽血
C. 操作失败,应取得病人了解再操作
D. 抽血检验肝功能时应空腹采血
E. 在输液时可以利用输液针头采血
【单选题】
静脉采血止血带压迫时间过长可引起___
A. 白细胞分类值异常
B. 血沉增快
C. 使某些凝血因子活性增高
D. 红细胞计数值偏低
E. 红细胞形态改变
【单选题】
PICC的最佳穿刺血管是___
A. 贵要静脉
B. 头静脉
C. 正中静脉
D. 尺静脉
E. 桡静脉
【单选题】
PICC穿刺点的消毒范围是___
A. 穿刺点周围10cm*10cm
B. 穿刺点周围10cm*10cm,两侧到臂缘
C. 穿刺点周围8*8cm
D. 穿刺点周围5*5cm
E. 以上都不是
【单选题】
PICC每次输液后,应用什么型号的注射器抽吸生理盐水冲管___
A. 2ml以下
B. 5ml以下
C. 10ml以下
D. 10ml以上
E. 各种型号
【单选题】
成人胸外心脏按压,下列错误的是___
A. 病人仰卧背部垫板
B. 施救者用手掌根部按压
C. 按压部位在病人心尖区
D. 使胸骨下陷至少5cm
E. 按压节律100-120次/分