刷题
导入试题
【单选题】
___ system let you run more tlian one program at a time
A. : Application
B. :Software
C. : Real time
D. :Multitask
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
推荐试题
【单选题】
24.东风4B型客运机车构造速度为:___
A. 120km/h
B. 140km/h
C. 170km/h
【单选题】
25.机车牵引齿轮传动比越大,则___。
A. 速度越高、牵引力越大
B. 速度越低、牵引力越大
C. 速度越高、牵引力越小
【单选题】
26.由启动变速箱驱动的装置有:___。
A. 启动发电机、励磁机、测速发电机、后通风机
B. 启动发电机、励磁机、静液压泵、前通风机
C. 启动发电机、励磁机、测速发电机、前通风机
【单选题】
27.转向架的轴箱定位靠___完成。
A. 构架
B. 轴箱拉杆
C. 轴箱弹簧
【单选题】
28.当机车浮沉振动时,油压减振器的鞲鞴与缸筒所形成的上、下油腔容积会发生变化,其中的工作油在流经心阀或进油阀上的节流空时由于___作用而衰减了机车的振动。
A. 润滑
B. 粘滞阻力
C. 密封
【单选题】
29.使机车车体与转向架在纵向以关节形式连接起来,传递牵引力和制动力,以及车体与转向架间的各种冲击力,该部件是___。
A. 二系悬挂装置
B. 车体侧挡
C. 牵引杆装置
【单选题】
30.东风4B型机车牵引电动机的悬挂采用了___结构
A. 轴悬式
B. 架悬式
C. 体悬式
【单选题】
31.列车施行制动后不再进行缓解,根据列车减速情况进行追加减压,即可使列车停于预定地点,叫作___。P119T498
A. 一段制动法
B. 二段制动法
C. 牵引辅助法
【单选题】
32.防止列车断钩,坡道起动时,视情况可采用___的方法,随着列车缓解再逐步加大起动电流。P121T506
A. 先缓解制动后加载
B. 先加载后缓解制动
C. 直接起动
【单选题】
33.防止列车断钩,进站停车施行空气制动要适当加长制动距离,初次减压量要小,做到___。P121T506
A. “早减压、少减压”
B. 晚减压、大减压
C. 晚减压、少减压
【单选题】
34.以压力空气作为动力来源,但___用电来控制制动装置的制动、保压和缓解作用。P126T521
A. 空气制动机
B. 电空制动机
C. 真空制动机
【单选题】
35.使用带有闸片的制动钳夹紧安装在车轮两侧或车轴上的制动盘,使其发生摩擦阻力而产生制动作用称为___。P127T522
A. 闸瓦制动
B. 盘形制动
C. 轨道电磁制动
【单选题】
36.制动盘装在车轮上的叫___盘形制动基础制动装置。P130T532,
A. 轮盘式
B. 轴盘式
C. 摩擦式
【单选题】
37.截断塞门安装在车辆制动___上。P131T536
A. 主管两端
B. 主管中部
C. 支管
【单选题】
38.凡遇列车中某一车辆制动机发生故障,不能及时修复或因车辆装载的货物规定需停止使用该车制动机等情况时,可以关闭___,同时拉动缓解阀。P131T536
A. 折角塞门
B. 排风塞门
C. 截断塞门
【单选题】
39.一辆车的___,就是在制动管一定的减压速度下经过一定的时间或一定的减压量,制动机必须发生制动作用。P140T549
A. 制动灵敏度
B. 缓解灵敏度
C. 稳定性
【单选题】
40.制动管经排气口向大气排气时,制动管中的压力降将沿着列车长度___逐次传播,就是空气波。P140T550
A. 由后向前
B. 由中间到两端
C. 由前向后
【单选题】
41.LKJ-2000监控装置采用___工作方式。P170T694
A. 单机冗余
B. 双机冗余
C. 双机
【单选题】
42.LKJ-2000型监控记录装置事故状态记录器(黑匣子)在机车走行距离每变化___所有内容记录一次。P172T697
A. 5m
B. 10m
C. 20m
【单选题】
43.预设安全距离为20m时,紧急制动时的速度为80km/h,那么停车后的安全距离是___。P176T724
A. 50m
B. 60m
C. 70m
【单选题】
44.LKJ-2000型监控记录装置上电自检后,显示器进入主界面显示状态,两端操作___。《LKJ2000型列车运行监控记录装置》P255
A. 均无效
B. 一端有效
C. 均有效
【单选题】
45.LKJ-2000监控装置在正常监控状态下,可用【↓】【↑】方向键调整屏幕亮度,共有___个亮度等级 。《LKJ2000型列车运行监控记录装置》P256
A. 3
B. 4
C. 5
【单选题】
46.机车挂车时,机车距脱轨器、防护信号、车列___m前必须停车。 C13
A. 5
B. 10
C. 20
【单选题】
47.机车挂车时,确认脱轨器、防护信号撤除后,显示连挂信号,以不超过___km/h的速度平稳连挂。 C13
A. 5
B. 8
C. 10
【单选题】
48.制动机进行简略试验时,自阀减压___kPa并保压1min,检查制动主管贯通状态,司机检查制动主管漏泄量,每分钟不得超过20kPa。 C15
A. 50
B. 100
C. 最大有效减压量
【单选题】
49.货物列车起动困难时,可适当压缩车钩,但不应超过总辆数的___。 C16
A. 三分之一
B. 三分之二
C. 二分之一
【单选题】
50.货物列车速度在___km/h以下时,不应缓解列车制动。 C28
A. 15
B. 20
C. 30
【单选题】
51.列车进入停车线施行制动停车时,追加减压一般不应超过___次;一次追加减压量,不得超过初次减压量。 C28
A. 一
B. 两
C. 三
【单选题】
153.错误办理行车凭证发车或耽误列车事故的责任划分:司机起动列车,定___单位责任。事58
A. 车务
B. 机务
C. 车务、机务
【单选题】
53.应停车的客运列车错办通过,定车站责任;在区间乘降所错误通过,定___单位责任。事59
A. 车务
B. 机务
C. 车务、机务
【单选题】
54.总公司、铁路局行车安全监察人员,凭___登乘机车。运31
A. 登乘机车证
B. 工作证
C. 监察证
【单选题】
55.回送机车在一地滞留时间超过___小时(故障除外),所在局调度所要向总公司汇报滞留原因及解决措施。 运75
A. 8
B. 12
C. 24
【单选题】
56.铁路机车车辆驾驶人员资格申请人隐瞒有关情况或提供虚假材料的,___年内不得再次申请。18号文第38条
A. 1
B. 2
C. 0.5
【单选题】
57.铁路机车车辆驾驶人员资格申请人在考试过程中有贿赂、舞弊行为的,取消考试资格,已经通过的考试科目成绩无效,且___内不得再次申请.18号文第39条
A. 1
B. 2
C. 0.5
【单选题】
58.铁路职工违反规章制度,致使发生铁路运营安全事故,造成严重后果的,处___年以下有期徒刑或者拘役。 《刑法》
A. 一
B. 二
C. 三
【单选题】
59.铁路职工玩忽职守、违反规章制度造成铁路运营事故的,___。B《铁路法》
A. 给予批评教育
B. 给予行政处分
C. 追究刑事责任
【单选题】
60.从业人员发现事故隐患或者其他不安全因素,应当___向现场安全生产管理人员或者本单位负责人报告;接到报告的人员应当及时予以处理。 《安全生产法》
A. 事后
B. 在作业的同时
C. 立即
【单选题】
61.生产经营单位的从业人员不服从管理,违反安全生产规章制度或者操作规程的,构成犯罪的,依照___有关规定追究刑事责任。 《安全生产法》
A. 铁路法
B. 铁路安全管理条例
C. 刑法
【单选题】
62.铁路机车车辆的驾驶人员持过期或者失效驾驶证件执业的,由___责令改正,可以处1000元以下的罚款。 《条例》处罚办法
A. 地区铁路监督管理局
B. 总公司
C. 铁路局
【单选题】
63.申请人隐瞒有关情况或提供虚假材料的,___不得再次申请。 《驾驶人员资格许可》
A. 年度内
B. 1年内
C. 2年内
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用