刷题
导入试题
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
推荐试题
【判断题】
CRH2A统型动车组辅助电源装置清洁,机械师用高压风和毛刷清理辅助电源装置线圈及感应器
A. 对
B. 错
【判断题】
辅助电源装置检查动车组升弓供电后作业人员分别在车下两侧辅助电源装置位置确认设备工作状态正常,风机运转正常,无异音
A. 对
B. 错
【判断题】
CRH2A统型动车组接地继电器检查,动车组升弓供电后,1、2配合使用万用表交流电压档测量接地继电器GR3的701B与700A间电压,测量值应小于5V
A. 对
B. 错
【判断题】
CRH2A统型动车组动车组103号线全列贯通
A. 对
B. 错
【判断题】
CRH2A统型动车组主空调压器(CMGV)检测时,双针压力表红色指针(MR管压力)需在2分钟内上升至880±10kpa,同时所有空气压缩机停止工作,MON显示器上各车的CMP同时由红变黑
A. 对
B. 错
【判断题】
CRH2A统型动车组辅助空压机检查观察压力指针表指向640±10KPa时,确认司机室前台「准备未完成」显示灯亮
A. 对
B. 错
【判断题】
CRH2A统型动车组启动辅助空压机约1分钟后,确认辅助空气压缩机压力表指针至880±10kPa,辅助空气压缩机停止运转
A. 对
B. 错
【判断题】
CRH2A统型动车组主空压机润滑油更换需要使空压机启动10次
A. 对
B. 错
【判断题】
CRH2A统型动车组BCU防滑阀自检实验上拨码开关SW1置于4、SW2置于4、SW6向上搬动2秒以上
A. 对
B. 错
【判断题】
CRH2型动车接地电刷的异常损耗或固滞,将造成电机、驱动装置的轴承以及齿轮的齿面发生电蚀,从而引起故障
A. 对
B. 错
【判断题】
CRH2A统型动车组自动过分相装置检测作业时,使用万用表欧姆档分别测量其插孔1和2,3和4,6和7以及19和20之间的直流阻值,电阻值正常范围应在550~850Ω
A. 对
B. 错
【判断题】
CRH2A统型动车组自动过分相装置输出主断“断”“合”信号后,在2分钟内无法再接收信号,因此每项试验完成后,需等待5分钟或重新开机自检后,再进行下一项试验
A. 对
B. 错
【判断题】
CRH2A统型动车组动过分相装置检测作业强迫状态试验时,按下信号处理器上的试验按钮,通过信号处理器显示灯确认过分相强迫信号输出(1s脉宽),动车组进行强迫自动过分相动作
A. 对
B. 错
【判断题】
CRH2A统型动车组轮径设定方法,在【监控信息设定】画面中,按下“车轮径设定”键
A. 对
B. 错
【判断题】
CRH2A统型动车组远程控制切除时先选择单元再选择切除部位
A. 对
B. 错
【判断题】
CRH2A统型动车组连接切换开关检查时,在司机室投入主控,按下司机室分并配电盘内的“强制”开关,确认连接切换开关、空气管开闭器动作良好,耳听确认连接切换开关、空气管开闭器与空气管路连接处无漏风
A. 对
B. 错
【判断题】
CRH2A统型动车组空调机组二级修检查,将空调打到“强冷”位,工作10分钟后,车厢内温度有明显变化;通过空调控制器确认压缩机工作电流与工况图吻合
A. 对
B. 错
【判断题】
CRH2A统型动车组在车门关闭状态下,在车内使用专用钥匙操作,可锁闭侧拉门(气密、非气密时都可以)
A. 对
B. 错
【判断题】
CRH2A统型动车组,与动力集中型动车组相比,动力分散型动车组的优点之一,是牵引力分散在各个动力车轮上,可解决高速动车组大牵引力与轴重限制之间的矛盾
A. 对
B. 错
【判断题】
CRH380A统型动车组车体倾斜尺寸测量需使用卷尺测量同一辆车在空车时,端梁最边缘下端至轨面的垂直高度,并将数据记录
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门车门关闭到位后,关门到位开关碰柱上的红线露出开关体1~2mm
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门装置内各机构检查检查控气压液压转换装置、压紧油缸以及其它供气、供油管路的接头无松脱、漏气、漏油现象,接头的紧固螺母防松标记无错位
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门装置内各机构检查检查侧拉门门板下沿密封胶条压板的安装状态良好;门板下沿与排水槽之间的间隙不小于 2mm
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门开门时间测试时,投入主控,打开中央控制装置,按【检修】开关,进入检修模式;将司机室左侧配电盘车上试验、【空档】开关右旋至闭合位,单控门置于集控位
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门开门时间测试时,触摸监控显示器(MON)进入【车上检查实行】界面,再触摸车门开关试验选项,触摸【确认】
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门开门时间测试时,触摸监控显示器【下一页面】键后、触摸【确认】键,显示侧拉门关门时间为5~7.5s;窄幅侧拉门开门时间为2~3.5s,宽幅侧拉门开门时间为3~4.5s
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,侧门开关测试时,须确认01、06、00车配电盘上【门手控集控开关】处于集控位
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,今创侧门障碍检测时将30 mm x 60 mm检测块卡在滑槽内。做关门操作,确认该门防挤压功能良好
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,前窗玻璃加热温度控制器的温度控制点为:25℃和40℃。低于25℃开始加热,升高至40℃,停止加热,如此循环
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,YH400电连接器检查作业人员对车端连接处的电缆和电连接器电缆夹进行检查,要求电缆与电连接器电缆夹之间无位移
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修,自动车钩缓冲装置检查及润滑作业时,注意首先将头罩开闭机构供风管路截断塞门关闭,防止挤伤
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修检查清洁电钩时须锁定防尘盖,防止电钩防尘盖打下,造成人身伤害
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修自动车钩高度测量,测量头车车钩中心线到轨面高度,高度范围应为1000-1015mm。车钩钩头左右偏转角度不大于 1°
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修过渡车钩检查及润滑,用干布、毛刷清理车钩连接面、钩舌和钩舌腔,去除杂物,在钩舌和钩舌腔表面涂抹润滑脂;转动钩舌,确认钩舌动作良好
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修检查头罩开闭机构机械部分磨耗部位润滑情况,并对磨耗部位使用润滑脂进行润滑。对导轨、上翼板转轴、下翼板转轴三处润滑
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修内风挡拆卸渡板使用十字螺丝刀拆下渡板装饰盖上4个沉头螺丝,取下装饰板后,使用棘轮扳手、加长杆及16mm套筒卸下渡板固定螺栓,取下渡板
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修车顶检修、清洁作业时,使用中性清洗剂清洗车顶油漆部位,确认表面洁净
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修制动盘(单侧)磨耗尺寸须符合限度要求:轮盘磨耗量≤2.8mm或同一车轮两侧磨损差不超过2mm
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修接地装置在00、01车2、3位轴1位侧轴箱
A. 对
B. 错
【判断题】
CRH380A统型动车组二级修磁性栓排油栓检查清洁时,发现无光泽的大块铁粉(有可能是轴承保持器破损)黑色的鳞状的薄铁皮大量粘附)(有可能是轴承烧坏)以上情况出现时,需更换轮对
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用