【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
推荐试题
【单选题】
在正交平面内,( )之和等于90°。___
A. 前角、后角、刀尖角
B. 前角、后角、楔角
C. 主偏角、副偏角、刀尖角
D. 主偏角、副偏角、楔角
【单选题】
铸件在加工后出现变形的原因是( )___
A. 热影响变形
B. 受力变形
C. 内应力消除变形
D. 系统变形
【单选题】
容易发生鳞刺的加工是()。___
A. 高速车削45钢
B. 低速车削25钢
C. 磨削铸铁
D. 磨削淬火钢
【单选题】
一个工序的定义,强调的是( )。___
A. 工作地点固定与工作连续
B. 只能加工一个工件
C. 只能是一个工人完成
D. 只能在一台机床上完成
【单选题】
数控机床夹具具有快速装夹工件的特点,若对自锁性有要求,则多采用()。___
A. 联动夹紧机构
B. 定心夹紧机构
C. 快速螺旋夹紧机构
D. 铰链夹紧机构
【单选题】
金属结晶后的晶粒越小,晶体缺陷越多,则对金属的( )影响越大。___
A. 物理性能
B. 化学性能
C. 力学性能
D. 工艺性能
【单选题】
金刚石刀具非常适合切削()材料。___
A. 45钢
B. 低碳钢
C. 铸铁
D. 非金属材料
【单选题】
车削细长杆时,受工件热变形影响,容易出现( )的形状误差___
A. 两端粗、中间细
B. 两端细、中间粗
C. 锥形
D. 双曲线
【单选题】
将若干个( )组合起来,就成为一个传动系统,称为传动链。___
A. 传动副
B. 机构
C. 齿轮传动
D. 带传动
【单选题】
自为基准是以加工面本身作为精基准,多用于精加工或光整加工工序中,这是( )。___
A. 符合基准统一原则
B. 符合基准重合原则
C. 能保证加工面的余量小而均匀
D. 能保证加工面的形状和位置精度
【单选题】
用同一平面上的两点定位能限制()个自由度。___
【单选题】
常用的夹紧机构中,对工件尺寸公差要求高的是( )机构。___
【单选题】
编制()时热处理工序可注明。___
A. 工艺过程卡
B. 工序卡
C. 刀具卡
D. 走刀路线图
【单选题】
对所有表面都要加工的零件,在定位时应当根据( )的表面找正。___
A. 加工余量小
B. 光滑平整
C. 粗糙不平
D. 加工余量大
【单选题】
装配尺寸链的最短路线(环数最少)原则,即( )。___
A. 一件一环
B. 单件自保
C. 两件一环
D. 一件两环
【单选题】
称为调质钢的材料是()。___
A. 20号钢
B. 45号钢
C. 25号钢
D. 65号钢
【单选题】
以下不属于切削加工工步顺序安排的原则是()。___
A. 先粗后精原则
B. 先主后次原则
C. 先内腔后外表面原则
D. 先面后孔原则
【单选题】
一个工序的定义,强调的是( )。___
A. 工作地点固定与工作连续
B. 只能加工一个工件
C. 只能是一个工人完成
D. 只能在一台机床上完成
【单选题】
( )夹紧力大,适用于轴类工件粗加工和半精加工的装夹。___
A. 三爪自定心卡盘
B. 四爪单动卡盘
C. 两顶尖
D. 一夹一顶
【单选题】
只有在定位基准和定位元件精度很高时,( )才允许采用。___
A. 完全定位
B. 过定位
C. 重复定位
D. 欠定位
【单选题】
退火用于( )钢铁在铸造、锻压和焊接过程中形成的残余应力以及开裂等各种组织缺陷。___
A. 改变
B. 改善或消除
C. 改善
D. 消除
【单选题】
刀具的几何参数中,()不是影响切削力的主要因素。___
A. 前角
B. 主偏角
C. 刀尖圆弧半径
D. 副偏角
【单选题】
单件小批生产的特征是( )。___
A. 毛坯粗糙,工人技术水平要求低
B. 毛坯粗糙,工人技术水平要求高
C. 毛坯精化,工人技术水平要求低
D. 毛坯精化,工人技术水平要求高
【单选题】
称为调质钢的材料是()。 ___
A. 20号钢
B. 45号钢
C. 25号钢
D. 65号钢
【单选题】
( )不能通过改变工艺装备的方式加以改善。___
A. 加工精度
B. 加工误差
C. 制造成本
D. 经济精度
【单选题】
编制细长轴的车削工艺时重要考虑()。___
A. 机床的功率
B. 刀具的主后角
C. 机床传动链误差
D. 工件的振动
【单选题】
CBN刀具非常适合切削()材料。___
A. 铝合金
B. 铜合金
C. 铸铁
D. 非金属材料
【单选题】
积屑瘤对加工影响正确的是()。___
A. 保护刀具
B. 减小已加工表面粗糙度
C. 减小切削厚度
D. 减小刀具实际前角
【单选题】
零件是组成机器的最小单元,机器的质量最终是通过( )保证的。___
【单选题】
以下不属于切削加工工步顺序安排的原则是()。___
A. 先粗后精原则
B. 先主后次原则
C. 先内腔后外表面原则
D. 先面后孔原则
【单选题】
金属结晶后的晶粒越小,晶体缺陷越多,则对金属的( )影响越大。___
A. 物理性能
B. 化学性能
C. 力学性能
D. 工艺性能
【单选题】
基准是( )。 ___
A. 用来确定生产对象上几何要素关系的点、线、面
B. 在工件上特意设计的测量点
C. 工件上与机床接触的点
D. 工件的运动中心
【单选题】
对所有表面都要加工的零件,在定位时应当根据( )的表面找正。___
A. 加工余量小
B. 光滑平整
C. 粗糙不平
D. 加工余量大
【单选题】
宽V形块可以限制( )个自由度。___
【单选题】
车床上采用三爪卡盘夹持工件加工通孔,该种定位方式属于()。___
A. 完全定位
B. 不完全定位
C. 欠定位
D. 过定位
【单选题】
金属材料在载荷作用下抵抗变形和破坏的能力叫( )。___
【单选题】
碳素工具钢的含碳量是在( )之间。___
A. 0.65%~1.3%
B. 0.065%~0.13%
C. 6.5%~13%
D. 0.65‰~1.3‰
【单选题】
最终热处理一般安排在()。___
A. 粗加工之后
B. 半精加工之前
C. 精加工(磨削加工)之前
D. 半精加工之后
【单选题】
铣削速度取15m/min,刀具直径为80mm,则主轴转速应该为( )。___
A. ≈60r/min
B. ≈100r/min
C. ≈160r/min
D. ≈200r/min
【单选题】
装配尺寸链的封闭环是( )。___
A. 精度要求最高的环
B. 要保证的装配精度
C. 尺寸最小的环
D. 基本尺寸为零的环