【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
推荐试题
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,牵引杆挂车应在挂车前部的左右各装一只前红后白的牵引杆挂车标志灯,其高度应比牵引杆挂车的前栏板高出 300mm~400mm,距车厢外侧应小于 150mm。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,对称设置、功能相同的灯具的光色和亮度不应有明显差异。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(三轮汽车除外)和轮式拖拉机运输机组均应具有危险警告信号装置,其操纵装置不应受灯光总开关的控制。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车装备的前照灯应有远、近光变换功能;当远光变为近光时,所有远光应能同时熄灭。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,同一辆机动车上的前照灯不应左、右的远、近光灯同时开亮。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,同一轴上的轮胎规格和花纹可以不同,轮胎规格应符合整车制造厂的规定。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车用轮胎应有胎面磨耗标志。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车备胎规格与该车其他轮胎不同时,应在备胎附近明显位置(或其他适当位置)装置能永久保持的标识,以提醒驾驶人正确使用备胎。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,传动轴在运转时不应发生振抖和异响,中间轴承和万向节不应有裂纹和/或松旷现象。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,轮胎的胎面和胎壁上不应有长度超过 20mm 或深度足以暴露出轮胎帘布层的破裂和割伤。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,公路客车、旅游客车和危险货物运输货车及车长大于 12m 的其他客车、车长大于等于 6m 的旅居车应具有限速功能,否则应配备限速装置。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车身外部和内部乘员可能触及的任何部件、构件都不应有任何可能使人致伤的尖锐凸起物(如尖角、锐边等)。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于 12m 的公路客车和旅游客车及所有卧铺客车,车身应为全承载整体式框架结构。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于 7.5m 的客车和所有校车不应设置车外顶行李架。其他客车需设置车外顶行李架时,行李架高度应小于等于 300mm、长度不应超过车长的二分之一。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车门和车窗应启闭轻便,不应有自行开启现象,门锁应牢固可靠。门窗应密封良好,无漏水现象。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,客车除驾驶人门和应急门外,不应在车身右侧开设车门。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,装有电动窗(包括电动天窗)的乘用车,其控制装置应确保车窗玻璃在运动过程中能在任意位置可靠停住或遇障碍可自动下降(缩回)。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长小于 6m 的乘用车(救护车、囚车除外)不应设置侧向座椅和后向座椅,但设计和制造上具有行动不便乘客(如轮椅乘坐者)乘坐设施的乘用车设置的后向座椅除外。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车应设置能满足号牌安装要求的号牌板(架)。前号牌板(架)(摩托车除外)应设于前面的中部或右侧(按机动车前进方向),后号牌板(架)应设于后面的中部或右侧。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车应装有护轮板,总质量大于 7500kg 的货车、货车底盘改装的专项作业车及总质量大于 3500kg 的挂车应装有防飞溅系统,其他机动车的所有车轮均应有挡泥板。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,对于可翻转驾驶室,应有驾驶室锁止附加安全装置(如安全钩),并且在翻转操纵机构附近易见部位应有提醒驾驶人如何正确使用该操纵机构的文字。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(三轮汽车除外)应装备驾驶人汽车安全带佩戴提醒装置。当驾驶人未按规定佩戴汽车安全带时,应能通过视觉和声觉信号报警。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于等于 6m 的平头载客汽车及总质量大于 7500kg 的平头货车和平头货车底盘改装的专项作业车,应在车前至少设置两面前视镜或相应的监视装置,以保证驾驶人能看清风窗玻璃前下方长 1.5m、左侧驾驶室最外点平行于车辆纵向中心线,右侧为车辆纵向中心线向右 1.5m 宽范围内的情况; 但驾驶室/区高度无法满足前视镜的镜面或其托架的任何部分离地高度大于等于 1800mm 时,不应设置前视镜。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,车长大于等于 6m 的客车(乘坐人数小于 20 的专用客车除外),如车身右侧仅有一个乘客门且在车身左侧未设置驾驶人门,应在车身左侧或后部设置应急门。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,总质量大于 4500kg的货车(半挂牵引车除外)、货车底盘改装的专项作业车和挂车,应按 GB11567的规定提供防止人员卷入的侧面防护。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车驾驶室内应设置防止阳光直射而使驾驶人产生眩目的装置,且该装置在汽车碰撞时,不应对驾驶人造成伤害。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,汽车(无驾驶室的三轮汽车除外)应配备 2 件反光背心和 1 个符合 GB 19151 规定的三角警告牌,三角警告牌在车上应妥善放置。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,乘用车、旅居车、专用校车和车长小于 6m 的其他客车前后部应设置保险杠,货车(三轮汽车除外)和货车底盘改装的专项作业车应设置前保险杠。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,机动车发动机的排气管口不应指向车身右侧(如受结构限制排气管口必须偏向右侧时,排气管口气流方向与机动车纵向中心面的夹角应小于等于 15°),且若排气管口朝下则其气流方向与水平面的夹角应小于等于 45°;客车的排气尾管如为直式的,排气管口应伸出车身外蒙皮。
【判断题】
《机动车运行安全技术条件》(GB7258-2017)规定,救护车的车身颜色应为白色,左、右侧及车后正中应喷符合规定的图案。
【判断题】
《机动车查验工作规程》(GA801-2019)适用于办理机动车业务时对机动车进行检验,也适用于公安机关交通管理部门对机动车安全技术检验进行监督。
【判断题】
《机动车查验工作规程》(GA801-2019)规定,对危险货物运输车辆、客车、旅居车,查验急救包。
【判断题】
《机动车查验工作规程》(GA801-2019)规定,对警车、消防车、救护车和工程救险车,查验车辆外观制式、标志灯具和车用电子警报器。
【判断题】
《机动车查验工作规程》(GA801-2019)规定,专门查验区的视线应良好,其场地应平坦、硬实,长度、宽度和高度应能满足查验车型的实际需要。专门查验区应施划有标志标线,安装有视频监控系统,按标准配备有查验工具箱。
【判断题】
《机动车查验工作规程》(GA801-2019)规定,核对机动车安全技术检验合格证明时,应审查安全技术检验的项目是否齐全及检验结论是否为合格。
【多选题】
抵债资产类别主要包括( )。
A. 权属清晰的房产
B. 交通工具
C. 商品
D. 股权
【多选题】
收取抵债资产过程中所缴纳的税金包括( )等。
A. 契税
B. 车船使用税
C. 印花税
D. 房产税
【多选题】
收取抵债资产过程中所缴纳的费用包括( )、土地转让费、水利建设基金等
A. 过户费
B. 土地出让金
C. 交易管理费
D. 资产评估费