刷题
导入试题
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
推荐试题
【单选题】
中期贷款是指信用社发放的贷款期限在___的各种贷款。
A. 1年以上(含1年)3年以下;   
B. 1年以上5年以下(含5年);
C. 3年以上(含3年)5年以下;   
【单选题】
___是指村镇银行对各项贷款预计可能产生的贷款损失计提的准备。
A. 贷款损失准备   
B. 坏账准备   
C. 长期投资减值准备
【单选题】
营业网点柜员不得拒绝受理借记卡的开户、销户、___、挂失、存取款、转账、咨询等业务。
A.   透支                     
B.   换卡
C.   重写信息                 
D.   停用
【单选题】
玉川卡持卡人可利用自动柜员机,多媒体终端,等自助设备获取___服务。
A.   优惠                     
B.   12小时
C.   8小时                    
D.   24小时
【单选题】
因操作不当导致玉川卡被吞没时,持卡人应在7个工作日内,持___到自助设备所属营业网点领取被吞没卡。
A.   金燕卡开户申请表         
B.   有效身份证明
C.   单位介绍信               
D.   持卡人声明
【单选题】
自助设备的维护分日常维护、定期维护和___ 三种。
A.   随时维护                 
B.   随机维护
C.   专项维护                 
D.   专人维护
【单选题】
营业网点自助设备操作员必须___清理设备内吞没卡,逐张登记“吞没卡登记簿”,同时登记计算机运行日志。
A.   7日内                    
B.   定期
C.   按月                     
D.   随时
【单选题】
自助设备保险箱密码使用期限不得超过30天,更新密码时,保险箱必须是在 ___状态,密码修改完毕后,必须对新密码测试三次以上,确认更新正确后,方可正式使用。
A.   关闭                   
B.   开门
C.   使用                     
D.   断电
【单选题】
ATM具有存款、取款、修改密码、___等功能。
A.   转账                     
B.   授权
C.   余额查询                 
D.   挂失
【单选题】
临时存款账户(是指注册验资)有效期届满前退还资金的,应出具___部门的证明。
A. 当地人民银行                 
B. 税务
C. 注册会计师事务所         
D. 工商行政管理
【单选题】
下列___凭证不属于重要空白凭证。
A. 现金支票         
B. 股金证
C. 借款凭证         
D. 汇票
【单选题】
下列各项中,不符合票据和结算凭证填写要求的是___
A. 中文大写金额数字到“角”为止,在“角”后没有写“整”字
B. 票据的出票日期使用阿拉伯数字填写
C. 阿拉伯小写金额数字前填写了人民币符号
D. “3月3日”出票的票据,出票日期填写为“零叁月零叁日
【单选题】
临时存款账户的有效期最长不得超过___。
A. 2个月      
B. 6个月      
C. 1年      
D. 2年
【单选题】
中期贷款展期期限累计不得超过___
A. 原贷款期限的一半   
B. 原贷款期限
C. 3年               
D. 1年
【单选题】
实行综合柜员制网点,可以设置___名主管柜员。
A. 1
B. 2
C. 3
D. 4
【单选题】
下面有权扣划单位(人)存款的有权机关有:___
A. 海关
B. 人民检察院
C. 公安机关
D. 国家安全机关
【单选题】
再贴现是指金融机构为了取得资金,将未到期的已贴现汇票再以贴现的方式向___转让的票据行为。
A. 中国农业银行
B. 中国工商银行
C. 发起行
D. 中国人民银行
【单选题】
客户申请更换印鉴时,若客户财务专用章或公章遗失,须有原申请开户时___出具的证明。
A. 工商行政部门
B. 公安部门
C. 人民银行
D. 上级主管部门
【单选题】
若贷款设置为自动转逾期时,正常贷款到期的___系统自动进行账务处理并打印贷款转逾期清单。
A. 次日
B. 2日
C. 3日
D. 当日  
【单选题】
有权查询单位存款、股金的机关限于人民法院、税务机关、海关、人民检察院、公安机关、国家保卫部门、部队保卫部门、监狱、走私犯罪侦查机关、监察机关、审计机关、工商管理机关、___。
A. 市委、市府机关         
B. 企业管理局
C. 人民银行               
D. 证券管理机关
【单选题】
扣划存款单位(人),除审验:一是否为有权机关签发的协助扣划存款存款通知书和有效法律文书;二是审查通知书上被执行单位的开户是否本行、户名、账号以及大小写金额是否相符;还要审查___。
A. 执行人员的执行公务证或工作证是否真实有效            
B. 身份证
C.   单位介绍信
D. 存款单位证明
【单选题】
银行结算账户对帐,每___核对一次。
A. 旬                       
B. 月
C. 季度                     
D. 年
【单选题】
会计人员伪造的凭证,应___处理
A. 退回客户               
B. 没收凭证
C. 按凭证金额进行罚款     
D. 认真追究,及时报告领导
【单选题】
《中华人民共和国会计法》规定会计年度自___止。
A. 1月1日起至12月30日止
B. 公历1月1日起至12月31日止
C. 农历1月1日起至12月31日止
【单选题】
职工福利费、职工教育经费、工会经费计提标准分别为___.
A. 14%、1.5%、2%
B. 1.5%、2%、14%
C. 14%、2%、1.5%   
【单选题】
公安.税务.工商.司法等部门在查处案件需要信贷查阅档案时,必须持有___以上行政主管部门的正式公文或文书,经主任或分管主任批准后方可查阅.
A. 乡镇   
B. 县(级)  
C. 市级
【单选题】
现行法定存款准备金缴存比例为___  
A. 6%   
B. 7%   
C. 8%
【单选题】
金融机构收缴假币时,发现假人民币20张(枚)以上,应当立即报告___  ,并提供有关线索。
A. 中国人民银行   
B. 当地工商管理部门  
C. 当地公安机关
【单选题】
零存整取定期储蓄存款,每月固定存额,一般___元起存。
A. 5元  
B. 50元   
C. 1元
【单选题】
下面不是我国的支付结算办法确定的基本原则有___ 。
A. 诚实信用,履约付款  
B. 为客户保密
C. 谁的钱进谁的账,由谁支配
D. 银行不垫款
【单选题】
村镇银行的现行记账方法是___   。
A. 借贷记账法   
B. 资金收付记账法  
C. 单式记账法
【单选题】
《票据法》、《支付结算办法》规定:票据(凭证)金额以中文大写和阿拉伯数码同时记载,以下说法正确的是___  。
A. 如果两者不一致,以中文大写为准;
B. 如果两者不一致,以阿拉伯数字为准;
C. 两者必须一致,否则票据(凭证)无效
【单选题】
以下哪些证件属于《个人存款账户实名制规定》中的实名证件___  。
A. 中国人民解放军士兵证  
B. 机动车驾驶证  
C. 学生证
【单选题】
按照《人民币银行结算账户管理办法 》的规定 ,不得支付现金的存款账户是___  。
A. 基本存款账户     
B. 一般存款账户  
C. 临时存款账户     
D. 专用存款账户
【单选题】
贴现一张面额为2000元的银行承兑汇票,4个月后到期,年贴现率为12%,贴现息为___  :
A. 80  
B. 60     
C. 70   
D. 90
【单选题】
资产负债及所有者权益之间存在着___  的关系:
A. 必然不相等   
B. 可能相等或不相等
C. 必然相等     
D. 无法确定
【单选题】
损益表反映一定时期内___ 
A. 财务状况和盈利能力   
B. 经营成果形成情况
C. 营业利润、利润总额和利润总额分配情况
D. 营业收入、营业利润和利润分配情况
【单选题】
资产负债表的项目,按___  的分类,采用左右相平衡对照的结构:
A. 资产负债和所有者权益
B. 资产、负债、所有者权益、收入、费用、利润;
C. 收入、费用、利润
D. 资金来源、资金利用
【单选题】
一笔10万元的存款,存款期2年,年利率是10%,按单利计算到期后的利息为___  :
A. 20000元   
B. 220000元  
C. 10000元  
D. 90000元
【单选题】
下列哪些开支不能计入成本___  :
A. 被没收的财物所支付的滞纳金、罚款等;
B. 国家法律.法规规定的各种费用;
C. 购买固定资产所交纳的税金
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用