刷题
导入试题
【单选题】
Small business may use___ for word processing
A. : microcomputers
B. :industrial computers
C. : mainframe computers
D. :supercomputers
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Once you've made the Internet connection, you can send___ to any of computer user all around the w orld
A. :e-mail
B. :WWW
C. :ccc
D. :web station
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
推荐试题
【单选题】
下列对胰岛素降血糖作用的叙述,哪项是错误的___
A. 促进糖原合成
B. 促进糖原贮存
C. 增加糖原异生
D. 抑制糖原分解
【单选题】
下列哪种药不是治疗糖尿病的药物___
A. 甲巯咪唑
B. 苯乙双胍
C. 胰岛素
D. 甲苯磺丁脲
【单选题】
磺酰脲类口服降糖药的作用机制主要是___
A. 刺激胰岛β细胞分泌胰岛素
B. 加速葡萄糖的无氧酵解
C. 刺激胰岛α细胞分泌胰高血糖素
D. 增加葡萄糖利用,减少肠道吸收葡萄糖
【单选题】
胰岛素常用的给药途径是___
A. 口服给药
B. 皮下注射
C. 吸入给药
D. 舌下给药
【单选题】
应用胰岛素治疗过程中,病人出现饥饿感、出汗、心悸、焦虑、震颤等症状是___
A. 过敏反应
B. 胰岛素耐受性
C. 胰岛素剂量不足
D. 低血糖反应
【单选题】
不符合胰岛素特性的描述是___
A. 用于胰岛功能完全丧失的糖尿病
B. 刺激胰岛β细胞分泌胰岛素
C. 促进组织对葡萄糖的利用
D. 促进蛋白质合成,减少蛋白质分解
【单选题】
胰岛素与磺酰脲类共同的不良反应是___
A. 过敏反应
B. 粒细胞缺乏
C. 低血糖反应
D. 胃肠道反应
【单选题】
有关磺酰脲类降血糖作用叙述错误的是___
A. 对胰岛功能完全丧失的幼年糖尿病患者无效
B. 对胰岛功能完全丧失的幼年糖尿患者有效
C. 对磺胺类药物过敏者禁用
D. 对切除胰腺的动物无降血糖作用
【单选题】
刺激胰岛β细胞释放胰岛素的降血糖药物是___
A. 甲苯磺丁脲
B. 二甲双胍
C. 苯乙双胍
D. 阿卡波糖
【单选题】
双胍类降糖作用机制是___
A. 促进组织对葡萄糖的摄取和利用,抑制糖异生
B. 促进胰岛素分泌
C. 促进葡萄糖的排泄
D. 抑制胰高血糖素分泌
【单选题】
下列关于青霉素G性质的叙述哪项是错误的?___
A. 易溶于水
B. 水溶液极不稳定
C. 口服易被胃酸破坏
D. 在20℃时可放置24小时以上
【单选题】
青霉素最适于治疗的细菌感染是___
A. 溶血性链球菌
B. 葡萄球菌
C. 大肠埃希菌
D. 铜绿假单胞菌
【单选题】
青霉素的主要不良反应是___
A. 二重感染
B. 精神症状
C. 过敏反应
D. 骨髓抑制
【单选题】
青霉素类抗生素对铜绿假单胞菌有效的是:___
A. 青霉素G
B. 羧苄青霉素
C. 氨苄青霉素
D. 苯唑青霉素
【单选题】
治疗青霉素引起的过敏性休克首选___
A. 肾上腺素
B. 去甲肾上腺素
C. 抗组胺药
D. 地塞米松
【单选题】
青霉素的抗菌机制是___
A. 抑制菌体核酸的合成
B. 影响菌体胞浆膜的通透性
C. 抑制菌体蛋白质的合成
D. 抑制细菌细胞壁的合成
【单选题】
治疗破伤风应选用___
A. 青霉素G+TMP
B. 氨苄青霉素+TMP
C. 青霉素G+抗毒素
D. 红霉素+TMP
【单选题】
治疗扁桃体炎应首选___
A. 庆大霉素
B. 青霉素G
C. 氨苄青霉素
D. 四环素
【单选题】
下列属于β-内酰胺酶抑制剂的是___
A. 克拉维酸
B. 亚胺培南
C. 阿奇霉素
D. 罗红霉素
【单选题】
头孢菌素类与青霉素类在下列叙述中哪一条是不相同的___
A. 繁殖期杀菌剂
B. 抗菌谱窄
C. 抑制菌体细胞壁合成
D. 都含有β-内酰胺环
【单选题】
下列关于红霉素的叙述哪项是错误的___
A. 对胃酸极不稳定
B. 广谱抗菌药
C. 可用于对青霉素耐药的金葡菌感染
D. 主要经胆汁排泄
【单选题】
治疗金葡菌引起的骨髓炎疗效最好的是___
A. 氯霉素
B. 红霉素
C. 氯林可霉素
D. 四环素
【单选题】
氨基糖苷类抗生素不包括___
A. 大观霉素
B. 妥布霉素
C. 庆大霉素
D. 多西环素
【单选题】
下列哪项不属于四环素的抗菌范围___
A. 衣原体
B. 支原体
C. 真菌
D. 立克次体
【单选题】
氯霉素限制应用的主要原因是___
A. 二重感染
B. 抑制骨髓造血功能
C. 中毒性精神病
D. 过敏反应
【单选题】
孕妇和八岁以下儿童禁用的抗生素___
A. 头孢菌素类
B. 四环素类
C. 大环内酯类
D. 青霉素类
【单选题】
下列对链霉素的叙述错误的是___
A. 对革兰阴性杆菌有较强作用
B. 对结核分枝杆菌有杀灭作用
C. 对革兰阳性菌作用比青霉素强
D. 长期应用易损害第八对脑神经
【单选题】
下列药物中被称作广谱抗生素的是___
A. 红霉素
B. 多粘菌素E
C. 链霉素
D. 氯霉素
【单选题】
支原体肺炎宜选用___
A. 青霉素
B. 庆大霉素
C. 红霉素
D. 阿莫西林
【单选题】
下列疾病中使用氯霉素治疗效果最好的是___
A. 骨髓炎
B. 肠炎
C. 伤寒
D. 支原体肺炎
【单选题】
对斑疹伤寒的治疗宜选用___
A. 四环素
B. 氨苄青霉素
C. 青霉素
D. 红霉素
【单选题】
阻止细菌细胞壁合成的抗生素不包括___
A. 青霉素类
B. 头孢菌素类
C. 大观霉素
D. 去甲万古霉素
【单选题】
梅毒螺旋体感染应首选___
A. 苯唑西林
B. 氯唑西林
C. 青霉素
D. 红霉素
【单选题】
治疗鼠疫应首选___
A. 庆大霉素
B. 链霉素
C. 阿米卡星
D. 妥布霉素
【单选题】
对耳没有毒性的抗生素是___
A. 青霉素
B. 庆大霉素
C. 阿米卡星
D. 链霉素
【单选题】
下列可用于铜绿假单胞菌感染的药物是___
A. 红霉素
B. 庆大霉素
C. 氯霉素
D. 林可霉素
【单选题】
基糖苷类抗生素的主要不良反应是___
A. 胃肠道反应
B. 肝脏损害
C. 灰婴综合征
D. 第八对脑神经损害
【单选题】
红霉素忌用下列哪种溶液作溶媒___
A. 注射用水
B. 生理盐水
C. 5%葡萄糖
D. 以上都不是
【单选题】
青霉素的抗菌谱不包括___
A. 革兰阴性球菌
B. 革兰阳性球菌
C. 革兰阴性杆菌
D. 革兰阳性杆菌
【单选题】
氨基糖苷类药物作用机制___
A. 抑制细菌蛋白质合成
B. 抑制细菌细胞壁合成
C. 影响胞浆膜的通透性
D. 抑制二氢叶酸还原酶E.抑制DNA回旋酶
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用