刷题
导入试题
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
A. SHA
B. IPSec
C.
D. ES
【单选题】
What is the actual los privilege level of User Exec mode?___
A. 1
B. 0
C. 5
D. 15
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
推荐试题
【单选题】
大脑半球枕叶病变主要引起___
A. 听觉障碍
B. 视觉障碍
C. 嗅觉障碍
D. 味觉障碍
E. 肢体感觉障碍
【单选题】
脑梗死患者头部禁用冷敷,其目的是为了防止___
A. 意识障碍加深
B. 脑缺血加重
C. 偏瘫加重
D. 体温不升.血压升高
E. 神经功能恢复延缓
【单选题】
下运动神经元瘫痪的一个重要体征是___
A. 深反射增强
B. 深反射减弱或消失
C. 腱反射增强
D. 肌张力增高
E. 有病理反射
【单选题】
听觉中枢位于___
A. 距状裂浅层皮质
B. 优势大脑半球
C. 中央后回
D. 中央前回
E. 颞横回
【单选题】
感觉性失语或听觉性失语,其病变部位在优势半球的 ___
A. 顶上小叶
B. 颞上回后部
C. 枕叶
D. 顶下小叶
E. 额下回后
【单选题】
患者,男,46岁。活动中突然出现剧烈头痛,呕吐,查体发现颈抵抗,腰椎穿刺脑脊液呈均匀一致血性,最可能的诊断是___
A. 蛛网膜下隙出血
B. 脑室出血
C. 丘脑出血
D. 小脑出血
E. 脑梗死
【单选题】
对瘫痪患者的护理中,下列哪项措施不妥___
A. 保持肢体功能位
B. 翻身,拍背
C. 鼓励患者多饮水
D. 调整饮食以防止便秘发生
E. 由于瘫痪肢体不易移动,可将静脉输液放置在瘫痪侧肢体
【单选题】
颅内压增高时形成脑疝的主要原因是 ___
A. 脑水肿,脑体积增大
B. 颅腔内压力梯度明显改变
C. 脑脊液循环通路受阻
D. 弥漫性颅内压增高
E. 脑干水肿
【单选题】
在护理头痛患者时,下列不妥的措施是 ___
A. 将患者安置在安静的环境中休息
B. 静脉滴注脱水剂速度宜快
C. 伴颅内高压者,床脚抬高15°~30°
D. 可用开塞露通便,用止痛剂止痛
E. 密切观察意识.瞳孔等变化
【单选题】
短暂性脑缺血发作最主要的病因是 ___
A. 高血压
B. 动脉粥样硬化
C. 颅内动脉瘤
D. 微栓子
E. 风湿性心脏病
【单选题】
___ 患者,女,65岁。原有高血压史20年,于家中洗衣服时突感头晕,伴右侧肢体无力,随即倒地送入院,诊断为脑出血。护理体检:患者昏迷,左侧偏瘫,血压为200/116 mmHg。此时,护士保持患者安静卧床,护理动作轻柔,其目的主要是
A. 改善脑缺血
B. 防止颅内压升高
C. 避免血压升高
D. 降低脑水肿
E. 保持呼吸道通畅
【单选题】
对颅内压增高患者的处理,错误的一项是___
A. 发现有脑疝早期症状应立即应用脱水剂
B. 降低颅内压.控制脑水肿
C. 出现烦躁不安,紧急应用吗啡镇静
D. 及时通知医师,配合抢救
E. 发现呼吸骤停,若非气道阻塞,立即行人工呼吸
【单选题】
患者,男,20岁,有癫痫史多年,每次发作时表现为短暂的意识中断,持续10~15秒。对该患者的保健指导最重要的内容是___
A. 食物应清淡且富营养
B. 禁止从事带有危险的活动
C. 保持心情愉快
D. 戒烟酒.注意保暖.防止感冒
E. 劳逸结合
【单选题】
对癫痫患者进行保健指导时,不正确的指导是___
A. 开车要有人陪同
B. 禁止高空作业
C. 夏天防止中暑
D. 避免情绪波动和劳累
E. 需长期正规用药
【单选题】
脑出血最多见于___
A. 脑桥出血
B. 脑叶出血
C. 基底节区出血
D. 小脑出血
E. 脑室出血
【单选题】
患者,女.20岁,患急性多发性神经根炎入院,今日突然出现呼吸困难,面部青紫,需立即抢救,采取下列哪种方法最适当___
A. 洛贝林
B. 可拉明
C. 气管插管或气管切开
D. 体位引流
E. 口对口呼吸
【单选题】
对预防短暂性脑缺血发作复发有一定疗效的药物是 ___
A. 阿司匹林
B. 低分子右旋糖酐
C. 肝素
D. 尼莫地平
E. 血塞通
【单选题】
脑梗死患者,出现左下肢能离开床面,但不能抵抗阻力,该患者的肌力为___
A. 4级
B. 3级
C. 2级
D. 1级
E. 0级
【单选题】
关于多发性神经根炎的临床特征,不应包括___
A. 可有肌肉萎缩
B. 受累部位以四肢近端为主
C. 手指(趾)疼痛.麻木手套和袜套样分布
D. 腱反射减弱或消失
E. 感觉神经.运动神经和自主神经可受损
【单选题】
吉兰―巴雷综合征瘫痪患者下列护理措施不正确的是 ___
A. 补充营养
B. 耐心解释病情
C. 鼓励咳嗽,清除痰液
D. 保护瘫痪肢体,有利恢复
E. 绝对卧床避免作肢体被动运动
【单选题】
低钾周期性麻痹的诱因下列除外哪项 ___
A. 饱餐
B. 过度疲劳
C. 寒冷
D. 创伤
E. 低钠饮食
【单选题】
患者,男,75岁。有高血压病史30年,现突然出现剧烈头痛伴左侧上下肢瘫痪,诊断为脑出血,此时正确的护理措施是___
A. 头部热敷
B. 立即送往医院
C. 8小时后给予鼻饲流质
D. 去枕平卧位
E. 发病24~48小时内避免搬动
【单选题】
脊髓压迫症最有价值的检查是___
A. CTA.
B. MRI
C. MRA
D. CT
E. MRV
【单选题】
患者男,36岁,感冒后出现四肢瘫痪,饮水呛咳,吞咽困难,无二便障碍,医生诊断为吉兰―巴雷综合征,此患者面临的主要危险是 ___
A. 颅内压增高
B. 肺部感染
C. 泌尿道感染
D. 延髓麻痹
E. 呼吸肌麻痹
【单选题】
吉兰―巴雷综合征引起的瘫痪主要为 ___
A. 弛缓性瘫痪
B. 痉挛性瘫痪
C. 中枢性瘫痪
D. 交叉性瘫痪
E. 截瘫
【单选题】
重症肌无力最常见的首发症状为 ___
A. 眼外肌无力
B. 呼吸肌无力
C. 四肢肌无力
D. 咀嚼肌无力
E. 括约肌无力
【单选题】
脊髓炎急性期最常用的药物是 ___
A. 抗生素
B. 丙种球蛋白
C. 糖皮质激素
D. 能量合剂
E. 维生素
【单选题】
癫痫青春期肌阵挛发作首选的药物是 ___
A. 卡马西平
B. 苯妥英钠
C. 丙戊酸钠
D. 苯巴比妥
E. 地西泮
【单选题】
重症肌无力的患者出现呼吸困难,可能发生了哪种危象 ___
A. 复发性危象
B. 反拗性危象
C. 胆碱能危象
D. 肌无力危象
E. 有存在危象
【单选题】
对昏迷患者,护士最重要的观察是 ___
A. 体温
B. 神志
C. 呼吸
D. 瞳孔
E. 脉搏
【单选题】
类风湿性关节炎患者血中类风湿因子主要是下列哪一种 ___
A. 自身抗体IgA.
B. 自身抗体IgD
C. 自身抗体IgE
D. 自身抗体IgG
E. 自身抗体IgM
【单选题】
关于系统性红斑狼疮临床表现的描述,错误的是 ___
A. 有发热.面部蝶形红斑与四肢多形性红斑
B. 可出现类风湿性关节炎表现,但极少导致关节畸形
C. 可出现急进性肾炎.肾病综合征,但不引起尿毒症
D. 可有腹痛.呕吐.腹泻等
E. 可出现胸膜炎
【单选题】
风湿性疾病关节病变的突出护理诊断是 ___
A. 疼痛
B. 躯体移动障碍
C. 潜在并发症
D. 活动无耐力
E. 皮肤完整性受损
【单选题】
目前诊断和鉴别诊断风湿病的重要检测项目为___
A. CT
B. MRI
C. 肌肉活检
D. 常规血象检测
E. 自身抗体检测
【单选题】
下列哪项不是类风湿性皮下结节的特点 ___
A. 最常见于肘关节鹰嘴处
B. 骨隆起受压处也多见
C. 大小由数毫米至数厘米
D. 它的存在表示本病活动
E. 质硬.有压痛.非对称性分布
【单选题】
系统性红斑狼疮患者正确的皮肤护理方法是___
A. 每天肥皂水擦洗
B. 用热水敷红斑处
C. 清洗后可用化妆品
D. 用温水湿敷红斑处
E. 居室定期紫外线消毒
【单选题】
下列不属于风湿性疾病的共同临床特点是___
A. 属自身免疫病
B. 个体差异甚大
C. 病变累及多系统
D. 病程多呈急性
E. 抗生素治疗有效
【单选题】
系统性红斑狼疮皮肤损害的主要部位是 ___
A. 颈部
B. 前胸上部
C. 全腹部
D. 口腔粘膜
E. 颜面部位
【单选题】
系统性红斑狼疮患者脱发时的护理措施,哪项不正确 ___
A. 尽量剪成短发
B. 可用温水洗头
C. 忌染发.烫发
D. 多用肥皂按摩
E. 梅花针轻刺头皮
【单选题】
系统性红斑狼疮的心血管损害以下哪一项最常见 ___
A. 心包炎
B. 心肌炎
C. 心内膜炎
D. 心律失常
E. 周围血管病变
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用