【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
推荐试题
【多选题】
NB-IOT中支持3个SRB,分别是( )。
A. SRB1
B. SRB0
C. SRB1bis
D. SRB2
【多选题】
5G中CCE聚合等级包括( )。
A. 2
B. 1
C. 8
D. 16
E. 4
【多选题】
以下哪些是RRC建立原因?( )
A. HighPriorityAccess
B. MT-access
C. MO-data
D. MO-sigaling
E. emergency
【多选题】
关于S5接口以下哪些表述是正确的?( )
A. SGW和PGW之间可以采用GTP_C协议
B. SGW和PGW之间的接口
C. SGW负责为UE分配IP地址
D. SGW和PGW之间只支持GTP隧道协议
【多选题】
CDMA系统通过软切换可以提高系统质量,体现在:( )
A. 降低掉话率
B. 改善话音质量
C. 控制手机干扰
D. 改善小区覆盖
【多选题】
直放站中的关键技术有( )。
A. 增益,功率控制技术
B. 低噪放电路技术
C. 收发双工技术
D. RAKE接收技术
【多选题】
单站验证测试过程中,发现小区之间切换不及时,下列哪种解决办法是错误的?( )
A. 增大切换时延
B. CIO变小
C. 增大切换门限
D. CIO变大
【多选题】
针对弱覆盖导致的初始E-RAB连接建立失败,可能的调整措施包括( )
A. 调整对应小区的RS Power
B. 调整天线的方位角
C. 调整对应小区的各信道功率参数
D. 调整天线的下倾角
【多选题】
5G的含义包括:无所不在,超宽带,( )的无线接入。
A. 高可靠
B. 低延时
C. 高可信
D. 高密度
【多选题】
CDMA系统中, 切换失败的原因包括( )。
A. 目标小区导频覆盖和业务信道覆盖不一致
B. 目标小区资源不可用
C. 声码器速率不匹配
D. 制定小区不存在
E. 恢复到原信道失败
F. 切换过程超时
【多选题】
衰减器的主要用途是()。
A. 改变相位
B. 吸收射频功率
C. 调整电路中信号的大小
D. 改善阻抗匹配
【多选题】
逻辑上所有的交换机都由()和()两部分组成。
A. 数据转发逻辑
B. 输入/输出接口
C. 交换模块
D. MAC地址表
【多选题】
移动TDDLTE的F频段小区上行干扰源可能来自()
A. 联通或电信LTE信号干扰
B. 邻小区下终端的上行信号干扰
C. 邻近存在时钟故障的LTE小区干扰
D. 共站的GSM900谐波或DCS1800互调杂散干扰
E. 共站的TDS互调干扰
【多选题】
跟踪区的设计原则包括:()。
A. 对于LTE的接入网和核心网保持相同的跟踪区域的概念
B. 在LTE系统中应尽量减少因位置改变而引起的位置更新信令
C. 当UE处于空闲状态时,核心网能够知道UE所在的跟踪区
D. 当处于空闲状态的UE需要被寻呼时,必须在UE所注册的跟踪区的所有小区进行寻呼
【多选题】
以下哪些QCI值的承载是默认承载?()
A. QIC=1
B. QCI=9
C. QCI=2
D. QCI=5
【多选题】
VOLTE接通率为成功完成呼叫次数/终端发起呼叫总数。每次通话中,主叫UE发送第一条()后收到网络侧下发的()消息为成功完成呼叫。
A. SIPINVITE
B. SIP180Ring
C. PRACK200
D. SIP200OK
【多选题】
LTE下行采用了哪些多天线技术?()。
A. SFBC
B. MU-MIMO
C. FSTD
D. 波束赋形
【多选题】
影响小区平均吞吐率的因素()。
A. 系统带宽:系统的不同带宽决定了系统的总RB数
B. 本小区负载:直接影响本小区可使用的RB数
C. 数据信道可用带宽:公共信道的开销进一步决定了用户可以实际使用的资源,其中下行主要包括PDCCH和系统消息,上行主要包括PUCCH,SRS,PRACH
D. 邻区负载:DL/UL负载直接影响本小区平吞吐率
【多选题】
LTE支持两种RRC状态()
A. RRC_IDLE
B. RRC_ConnectionRequest
C. RRC_CONNECTED
D. RRC_Disconnect
【多选题】
NB-IoT系统中,包含的无线承载有()。
A. SRB0
B. SRB1bis
C. SRB1
D. SRB2
【多选题】
NB-IOT支持DCI模式有()。
A. FormatN0
B. FormatN3
C. FormatN1
D. FormatN2
【多选题】
OFDMnumerology是OFDM系统的基础参数集合,包含()。
A. 子载波间隔
B. 系统带宽
C. 循环前缀长度
D. TTI长度
【多选题】
CDMA20001X系统反向功控包括:()
A. 开环功控
B. 精确功控
C. 闭环功控
D. 外环功控
【多选题】
CDMA20001X支持()帧长。
A. 20ms
B. 80ms
C. 40ms
D. 60ms
【多选题】
手机发起位置登记流程可能基于以下()情况。
A. 基于覆盖
B. 基于时间
C. 基于位置
D. 开关机
【多选题】
以下哪些能增强VOLTE的覆盖?()
A. RLC分片
B. RoHC
C. 半静态调度
D. TTIBundling
【多选题】
一个RB由频域上连续12个子载波子载波宽度15kHz,时域上连续()个OFDM符号构成。
【多选题】
对于外部干扰,常用解决措施包括()
A. 修改干扰源设备参数。当干扰源是直放站或干放等放大设备时,可以修改其上下行增益,以改善自激,减轻对施主基站和周边基站的干扰。
B. 增加滤波器。当干扰源是PHS基站或CDMA1.9G基站时,其对LTE基站的干扰以杂散干扰为主,需与相关运营商协商为干扰源安装滤波器,以减轻对LTE系统的干扰。
C. 通过调整LTE系统的天线位置,方位角,下倾角,高度等,使天线主瓣背离干扰源,增加LTE系统与干扰源的空间隔离度。
D. 关闭干扰源
【多选题】
NB-IoT支持的小区重选的选项是()。
A. 重定向
B. 空闲态异频小区重选
C. 空闲态同频小区重选
D. 空闲态异系统重选
【多选题】
以下属于5GNR控制面协议栈子层的是()。
A. RLC
B. SDAP
C. RRC
D. MAC
E. PDCP
【多选题】
关于Ec/Io说法正确的是()
A. 导频信道没有bit信息,通常用Ec/Io来表示导频信道质量,而导频信道质量也就是对应的扇区的前向覆盖质量
B. Ec/Io体现了所接收信号的强度和邻小区干扰水平的比值
C. Ec是指一个chip的平均能量,Io是来自于其他小区的干扰
D. Ec/Io较大的区域覆盖质量一定很好
【多选题】
下列哪些是移动网常采用的抗干扰技术()。
A. 跳频
B. 同频复用
C. 分集技术
D. 功率控制
【多选题】
在LTE中,以下()信道是属于逻辑信道。
A. BCCH
B. DL-SCH
C. UL-SCH
D. CCCH
【多选题】
下列哪些无线承载属于Non-GBR?()
A. QCI=1
B. QCI=9
C. QCI=2
D. QCI=5
【多选题】
目前VoLTE,eSRVCC配置中有哪些事件触发,包括()
【多选题】
LTE网络参数规划包括()。
A. 邻区规划
B. TA规划
C. PCI规划
D. PRACH规划
【多选题】
影响语音质量的因素包括()
A. 网络延时
B. 网络丢包
C. 回声
D. 声音压缩
【多选题】
MCGfailure的触发原因有哪几种?()
A. uponT310expiry?
B. uponindicationfromMCGRLCthatthemaximumnumberofretransmissionshasbeenreachedforanSRBorDRB
C. uponT312expiry
D. uponrandomaccessproblemindicationfromMCGMACwhileneitherT300,T301,T304norT311isrunning
【多选题】
在3GPPRel-15的第一版本所定义的2种频率范围中,工作频段区间在24GHz~52.6GHz时支持的子载波间隔是()。
A. 15KHz
B. 120KHz
C. 30KHz
D. 60KHz
【多选题】
无线传播的三种基本模式是反射,绕射,散射,下面关于反射,绕射,散射的说法正确的是( )
A. 当电磁波穿行的介质中存在小于波长的物体并且单位体积内阻挡体的个数非常巨大时,发生绕射
B. 当电磁波穿行的介质中存在小于波长的物体并且单位体积内阻挡体的个数非常巨大时,发生散射。
C. 当电磁波遇到比波长大得多的物体时发生反射
D. 当接收机和发射机之间的无线路径被物体的边缘阻挡时发生散射