【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks
【多选题】
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?___
A. file reputation
B. file analysis
C. signature updates
D. network blocking
【多选题】
Which two statements about host-based iPS solutions are true?___
A. It uses only signature-based polices
B. It can be deployed at the perimeter.
C. It can be have more restrictive policies than network-based IPS
D. it works with deployed firewall
E. It can generate alerts based on be havior at the de sto
【多选题】
When two events would cause the state table of a stateful firewall to be updated? ___
A. when a packet is evaluated against the outbound access list and is denied
B. when a con nection is created
C. when rate-limiting is applied
D. when a connection s timer has expired within the state table.
E. when an outbound packet is forwarded to the outbound interface
【多选题】
Which two characteristics apply to an intrusion Prevention System(IPS)?___
A. Cannot drop the packet on its own
B. Cabled directly inline with the flow of the network traffic
C. Runs in promiscuous mode wat
D. Does not add delay to the original traffic
E. Can drop traffic based on a set of rules
【多选题】
crypto ipsec trans form-set myset esp-md5-hmac esp-aes-256,What are two effects of the given command?___
A. It configures authentication use AES 256.
B. It configures authentication to use MD5 HMAC
C. It configures authentication use AES 256.
D. It configures encryption to ase MD5 HMAC.
E. It configures encryption to use AES 256
【多选题】
your security team has discovered a malicious program that has been harvesting the CEos email messages and the com pany 's user database for the last 6 months. What are two possible types of attacks your team discovered?___
A. social activism
B. EPolymorphic Virus
C. advanced persistent threat
D. drive-by spyware
E. targeted malware
【单选题】
以下关于数据处理的叙述中,不正确的足___。
A. :数据处理不仅能预测不久的未来,自时还能影响未
B. :数据处理和数据分析可以为决策提供真知灼见
C. :数据处理的重点应从技术角度去发现和解释数据蕴涵的意义
D. :数据处理足从现实世界到数据,冉从数据到现实世界的过程
【单选题】
“互联网十制造”是实施《中国制造2025》的重要措施。以下对“互联网十制造”主要特征的叙述中,不正确的是___。
A. :数字技术得到普遍应用,设计和研发实现协同与共享
B. :通过系统集成,打通整个制造系统的数据流、信息流
C. :企业生产将从以用户为中心向以产品为中心转型
D. :企业、产品和用户通过网络平台实现联接和交互
【单选题】
信息技术对传统教育方式带来了深刻的变化。以下叙述中,不正确的是___。
A. :学习者可以克服时空障碍,实现随时、随地、随愿学习
B. :给学习者提供宽松的、内容丰富的、个性化的学习环境
C. :通过信息技术与学科教学的整合,激发学生的学习兴趣
D. :教育信息化的发展使学校各学科全部转型为电子化教育
【单选题】
厂参加技能考核的女工有___人。
A. :16
B. :18
C. :20
D. :24
【单选题】
(a+b-|a-b|)/2=___。
A. :a
B. :b
C. : min (a,b)
D. :max (a,b)
【单选题】
在信息收集过过程中,需要根据项目的目标把握数据___要求,既不要纳入过多无关的数据,也不要短缺主要的数据:既不要过于简化,也不要过于繁琐。
A. :适用性
B. :准确性
C. :安全性
D. :及时性
【单选题】
许多企业常把大量暂时不用的过期数据分类归档转存于___中。
A. :ROM
B. :移动硬盘
C. :cache
D. :RAM
【单选题】
信息传递的三个基本环节中,信息接收者称为___。
A. :信源
B. :信道
C. :信标
D. :信宿
【单选题】
数据处理过程中,影响数据精度的因素不包括___。
A. :显示器的分辨率
B. :收集数据的准确度
C. :数据的类型
D. :对小数位数的指定
【单选题】
某商场记录(统计)销售情况的数据库中,对每一种商品采用了国家统一的商品编码。这种做法的好处不包括___
A. :节省存储量
B. :确保唯一性
C. :便于人识别
D. :便于计算机处理
【单选题】
某地区对高二学生举行了一次数学统考,并按“成绩一人数”绘制了分布曲线。考试成绩呈___,分布比较合理。
A. :比较平坦的均匀分布
B. :两头高中间低的凹型分布
C. :大致逐渐降低的分布
D. :两头低中间高的正态分布
【单选题】
数据分析工具的___特性是指它能导入和导出各种常见格式的数据文件或分析结果。
A. :硬件兼容性
B. :软件兼容性
C. :数据兼容性
D. :应用兼容性
【单选题】
某数字校同平台的系统架构包括用户层和以下四层。制作各种可视化图表的工具属于___。
A. :基础设施层
B. :支撑平台层
C. :应用层
D. :表现层
【单选题】
微机CPU的主要性能指标不包括___。
A. :主频
B. :字长
C. :芯片尺寸
D. :运算速度
推荐试题
【简答题】
Again, the Russian army retreated to safety. Napoleon had a clear path to Moscow, but the occupation of the city became an empty victory. The Russians fled their capital. Soon after the French arrived, a raging fire destroyed two-thirds of the city. Napoleon offered a truce to Alexander I, but the Russian czar knew he could bide his time: "We shall let the Russian winter fight the war for us."
【简答题】
Napoleon soon realized he could not feed, clothe, and quarter his army in Moscow during the winter. In October 1812, he ordered his Grand Army to retreat from Moscow.
【简答题】
The French retreat turned into a nightmare. From fields and forests, the Russians launched hit-and-run attacks on the French. A short distance from Moscow, the temperature had already dropped to minus 4 degrees Celsius. On November 3, the winter's first snow came. Exhausted horses fell dead in their tracks. Cannon became stuck in the snow. Equipment had to be burned for fuel. Soldiers took ill and froze to death. The French soldiers dragged on, leaving the dead along every mile.
【简答题】
As the Russian army was gathering its strength, the French had to flee Russia to avoid certain defeat. At the Berezina River, the Russians nearly trapped the retreating French by burning the bridges over the swollen river. But Napoleon, by a stroke of luck, was able to build two new bridges. Thousands of French soldiers escaped, but at the cost of fifty thousand dead. Once across the Berezina, the tattered survivors limped toward Vilna.
【简答题】
Of the six hundred thousand soldiers Napoleon had led into Russia, less than one hundred thousand came back. The weakened French army continued its retreat westward across Europe. Soon, Britain, Austria, Russia, and Prussia formed a powerful alliance and attacked these stragglers. In March 1814, Paris was captured. Napoleon abdicated and went into exile, his empire at an end.
【简答题】
By early 1941, Adolf Hitler, leader of Nazi Germany, had seized control of most of Europe. To the east of Hitler's German empire was the Soviet Union. On June 22, 1941, without a declaration of war, Hitler began an invasion of the Soviet Union that was the largest military land campaign in history. Confident of a quick victory, Hitler expected the campaign to last no longer than three months. He planned to use the blitzkrieg, or "lightning war," tactics that had defeated the rest of Europe. The invasion had three broad thrusts: against Leningrad and Moscow and through the Ukraine.
【简答题】
Caught off guard by the invasion, Soviet leader Joseph Stalin instructed the Russian people to "scorch the earth" in front of the German invaders. Farms and factories were burned, destroyed, or rendered useless. During the first ten weeks of the invasion, the Germans pushed the front eastward, and the Russians suffered more than a million casualties.
【简答题】
In the north, the Germans closed in on Leningrad. Despite great suffering, however, the people of Leningrad refused to surrender. As the battle of Leningrad dragged on into winter, the city's situation became desperate. As food ran out, people died from hunger and disease. By the middle of the winter of 1941-1942, nearly four thousand people starved to death every day. Close to one million people died as a result of the siege.
【简答题】
In the center of Russia, Hitler's goal was the capture of Moscow. Because the Germans had anticipated a quick victory, they had made no plans for winter supplies. October arrived with heavy rains. "General Mud" slowed down the movement of the Germans' lightning attack.
【简答题】
As Hitler's armies drew closer and closer to Moscow, an early, severe winter settled over the Soviet Union, the harshest in years. Temperatures dropped to minus 48 degrees Celsius. Heavy snows fell. The German soldiers, completely unprepared for the Russian winter, froze in their light summer uniforms. The German tanks lay buried in the heavy snowbanks. The Russian winter brought the German offensive to a halt.
【简答题】
By the summer of 1942, Hitler had launched two new offensives. In the south, the Germans captured Sevastopol. Hitler then pushed east to Stalingrad, a great industrial city that stretched for 48 kilometers along the Volga River. Despite great suffering, Soviet defenders refused to give up Stalingrad.
【简答题】
In November 1942, the Russians launched a counterattack. With little or no shelter from the winter cold in and around Stalingrad, German troops were further weakened by a lack of food and supplies. Not until January 1943 did the Germans give up their siege. Of the three hundred thousand Germans attacking Stalingrad, only ninety thousand starving soldiers were left. The loss of the battle for Stalingrad finally turned the tide against Hitler. The German victories were over, thanks in part to the Russian winter.
【简答题】
During 1943 and 1944, the Soviet armies pushed the German front back toward the west. In the north, the Red Army broke the three-year siege of Leningrad with a surprise attack on January 15, 1944. Within two weeks, the heroic survivors of Leningrad saw their invaders depart. By March 1944, the Ukraine farming region was again in Soviet hands. On May 9, 1944, Sevastopol was liberated from the Germans. The Russians were now heading for Berlin.
【简答题】
For Hitler, the invasion of the Soviet Union had turned into a military disaster. For the Russian people, it brought unspeakable suffering. The total Soviet dead in World War II reached almost 23 million.
【简答题】
The elements of nature must be reckoned with in any military campaign. Napoleon and Hitler both underestimated the severity of the Russian winter. Snow, ice, and freezing temperatures took their toll on both invading armies. For the Russian people, the winter was an icy defender.
【单选题】
________不属于鼠类及体表寄生虫携带的病原体。___
A. 鼠疫耶尔森菌
B. 汉坦病毒
C. 黄病毒属病毒
D. 致病性钩端螺旋体
【单选题】
病媒生物死体样本运送,如果在24h内不能到达实验室的,运送过程中箱内温度应保持在_____。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物死体样本运送,如果在装箱后4h内能够到达实验室的,运送过程中箱内温度应保持在______。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物的死体样本运送,如果4h-24h内能到达实验室的,应将样品置于-30℃冷冻后再送样,运送过程中箱内温度应保持在________。___
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
恰加斯病也称为美洲锥虫病,其重要的传播媒介是________。___
A. 采采蝇
B. 厩螫蝇
C. 锥蝽
D. 埃及伊蚊
【单选题】
_______是黑热病内脏利什曼病的主要传播媒介。___
【单选题】
对于用作虫媒病毒分离或检测的蚊类标本,现场采集后应采用_______方式处置和运送。___
A. 杀虫剂熏杀+常温运输
B. 等蚊虫自然死亡+常温运输
C. 冷冻处死+常温运输
D. 冷冻处死+冷冻状态运输
【单选题】
_______不适用于入出境集装箱携带蝇、蚊、蠓的采集。___
A. 挥网法
B. 电动吸蚊器法
C. 直接捡取法
D. 二氧化碳诱蚊灯法
【单选题】
入境航空器应在______开始病媒生物监测。___
A. 卸货完成后
B. 抵达后
C. 等航空公司通知
D. 发现病媒生物时
【单选题】
进行集装箱携带输入性病媒生物监测时应准备的个人防护用品包括______。___
A. 乳胶手套、防护服
B. 防毒面具
C. 自给式呼吸器
D. 化学防护服
【单选题】
若要对采集到的输入性鼠类进行携带的病毒进行检测,取得其内脏器官的保存温度是_____。___
A. -80℃或以下
B. 0℃
C. 常温
D. 4℃-8℃
【单选题】
截获输入性活鼠或来自鼠疫流行区死鼠及经总署专家组确认和复核属于全国口岸首次截获的病媒生物应在______报告总署。___
A. 2小时之内
B. 8小时之内
C. 12小时之内
D. 24小时之内
【单选题】
入境船舶的蚊类和蝇类等双翅目病媒生物监测调查应白天在检疫锚地停泊期间进行,锚位距陆地距离不少于______,或在船舶靠泊后_____内进行。___
A. 1000 m;1h
B. 800 m、2 h
C. 400 m、4 h
D. 100 m、24 h
【单选题】
开展入境船舶输入性病媒生物监测工作中,在采集并保存病媒生物时由________陪同人员确认。___
A. 旅行社
B. 船方
C. 代理公司
D. 海事部门
【单选题】
在国境口岸或者交通工具上发现______有反常死亡或者死因不明的,国境口岸有关单位或者交通工具的负责人,必须立即向卫生检疫机关报告,迅速查明原因,实施卫生处理。___
【单选题】
采用鼠夹法监测鼠密度,应连续布放______。___
【单选题】
______不属于口岸区域鼠类常用监测方法。___
A. 鼠笼法
B. 鼠夹法
C. 目测法
D. 粉迹法
【单选题】
采用粉迹法监测鼠类密度时,滑石粉块的尺寸是______。___
A. 20cm×20cm
B. 30cm×30cm
C. 40cm×40cm
D. 50cm×50cm
【单选题】
______不属于蚊虫幼虫监测指标。___
A. 容器指数
B. 刺叮指数
C. 房屋指数
D. 布雷图指数
【单选题】
______不属于蚊虫成虫监测方法。___
A. 人帐诱法
B. 人工小时法
C. 小黑板法
D. 诱蚊器收集法
【单选题】
______不属于蝇类成虫监测方法。___
A. 诱蝇笼诱捕法
B. 捕蝇网网捕法
C. 直接目测法
D. 路径指数法
【单选题】
啮齿动物的臼齿常具有_____。___
【单选题】
______是仓鼠科特征。___
A. 背部有背囊
B. 尾部有尾囊
C. 口中两侧有颊囊
D. 腹部腹面有腹囊
【单选题】
_______蜱类假头基通常为矩形。___
A. 花蜱属
B. 璃眼蜱属
C. 扇头蜱属
D. 异扇头蜱属
【单选题】
_________鉴别特征是:体型较大,前胸背板具褐色蝶形大斑,其后缘中央向后延伸不达后缘,且前缘具“T”型黄斑。___
A. 黑胸大蠊
B. 美洲大蠊
C. 德国小蠊
D. 褐斑大蠊