【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
推荐试题
【多选题】
框(边界)图伴随着DFMEA的开发过程,具有以下功用___
A. 显示的是产品零部件之间的物理、逻辑的关系
B. 显示了在设计范围内零部件和子系统的相互作用,包括信息、能量、力和液体的流
C. 目的在于理解对系统的要求或输入、基于输入或所实施的功能产生的活动、以及交付物或输出
D. 此图是由代表零部件的框和连接框的线组成,线反映产品零部件间如何关联或接口的
【多选题】
DFMEA关注的是将要发送给最终顾客(使用者)的产品的设计。对一个产品有效分析的首要任务是___
A. 建立小组
B. 确定范围
C. 建立描述产品功能和要求的框图或参数图
D. 清楚定义失效模式的RPN值
【多选题】
DFMEA中,对于潜在失效模式的理解是___
A. 零部件、子系统、系统可能潜在地不能满足或实现描述的预期功能的状态
B. 要用专业技术术语描述,不必描述成顾客能够注意到的现象
C. 一个功能可能有多个失效模式
D. 可能只有在特定的运行条件或特定的使用状态下发生
【多选题】
对于潜在的设计失效影响的理解是___
A. 指由顾客感受到的失效模式对功能的影响
B. 需要用顾客可能察觉或经历到的现象来描述失效影响
C. 顾客可以是内部顾客,也可以是最终使用者
D. 当失效模式可能会造成安全方面和不符合法律条例,必须清楚说明该影响
【多选题】
严重度是指___
A. 一个特定的失效模式的最严重的影响后果的评价等级
B. 要建立一个评估标准和评级系统
C. 严重度评价为1的失效模式不应该再进一步的分析
D. 评估标准是由小组同意建立的,所以即使严重度10或9的评价标准也是可以更改的
【多选题】
关于DFMEA发生频度,正确的理解是___
A. 是指一个特定原因/机制的发生可能性
B. 可以参照相似件的使用历史或经验数据
C. 用1-10级来评估
D. 没有先期历史的新产品/新技术,发生频率10为最小
【多选题】
关于DFMEA探测度,正确的理解是___
A. 现行的设计控制发现栏内,最佳的探测控制相关的等级
B. 不要因为发生频度等级低,就理所应当认为探测度等级也一定会低
C. 评价等级1专用作已证实的设计方案的失效预防
D. 等级范围1-10,等级10是指几乎不可能探测发现
【多选题】
下列决定措施的优先级别,正确的顺序是___
A. 严重等级最高的失效模式,当严重度等级为10-9时,小组确保风险已有控制措施或推荐的措施
B. 严重等级≤8的失效模式,小组考虑有最高发生频度和探测度等级的原因
C. 按风险顺序数RPN阀值来决定优先级别
D. 优先级别的选取建立在严重度、发生频度和探测度的分析上
【多选题】
PFMEA是一个动态文件,它是___
A. 在可行性认证阶段或之前启动
B. 在生产工具装备之前启动
C. 从单个零部件到总成的所有制造操作
D. 包括所有可能影响制造和装配操作的过程,发运、接收、材料运输、存储、传送或标签
【多选题】
DFMEA与PFMEA的联系在于___
A. DFMEA和PFMEA分析过程中识别的特性之间
B. 潜在的设计原因与潜在的过程失效模式之间
C. 所有过程相关的失效模式(会导致影响产品方面影响的)要保持DFMEA和PFMEA的一致
D. 潜在的设计失效模式等同于潜在的过程失效模式
【单选题】
常温下,刀具材料的硬度应在____以上___
A. 50HRC
B. 60HRC
C. 80HRC
D. 100HRC
【单选题】
车削时,切削热传出途径中所占比例最大的是___
A. 车刀
B. 工件
C. 铁屑
D. 空气介质
【单选题】
齿圈、防尘盖、衬圈等与外星轮或轴叉装配时,为保证压装后的产品质量,外星轮或轴叉的倒角是___
A. 10°
B. 15°
C. 30°
D. 45°
【单选题】
在SDS标准中要求PFMEA通常应多长时间评审一次?___
A. 每个月
B. 每半年
C. 每年
D. 不用评审
【单选题】
在试生产过程中,对其初始过程能力指数Ppk值进行测定时,应选取多少个工件?___
A. 10~50件产品
B. 50~100件产品
C. 100~300件产品
D. 300~500件产品
【单选题】
当程序中出现F550时,表示为___
A. 进给率为550rev/min
B. 进给速度为550mm/min
C. 进给量为550mm/min
D. 进给速度为550m/min
【单选题】
设备改造或软件升级后导致的工艺验证由何部门发起?___
A. 生产车间
B. 制造工程
C. 工程服务
D. 质量工程
【单选题】
1档轴叉装配负4档位三销节对传动轴总成的影响,以下说法正确的是:___
A. 总成移动端卡阻
B. 轴叉铆压力大
C. 总成圆周间隙超差
D. 总成轴向间隙超差
【单选题】
以下节型中最大摆角为23°的节型是:___
【单选题】
以下节型中轴向位移量最小的节型是:___
【单选题】
以下对089.5-1008R夹箍描述错误的是:___
A. 夹箍直径为ф89.5
B. 夹箍宽度为10mm
C. 夹箍厚度为0.8mm
D. 字母R表示镀锌夹箍
【单选题】
经常作为智能控制典型研究对象的是( ) ___
A. 智能机器人
B. 智能故障诊断系统
C. 智能制造系统
D. 智能决策系统
【单选题】
解决自动控制面临问题的一条有效途径就是,把人工智能等技术用入自动控制系统中,其核心是( )。 ___
A. 控制器智能化
B. 控制算法
C. 控制结构
D. 控制系统仿真
【单选题】
为了确保安全,用示教编程器手动运行机器人时,机器人的最高速度限制为( )。 ___
A. 250mm/s
B. 50mm/s
C. 800mm/s
D. 1600mm/s
【单选题】
试运行是指在不改变示教模式的前提下执行模拟再现动作的功能, 机器人动作速度超过示教最高速度时,以( )。 ___
A. 示教最高速度来限制运行
B. 程序给定的速度运行
C. 示教最低速度来运行
D. 程序报错
【单选题】
机器人的定义中,突出强调的是( )。___
A. 像人一样思维
B. 模仿人的功能
C. 具有人的形象
D. 感知能力很强
【单选题】
力传感器安装在工业机器人上的位置,通常不会在以下哪个位置( )。 ___
A. 机座
B. 机器人腕部
C. 手指指尖
D. 关节驱动器轴上
【单选题】
对于精度要求高的主轴部件,轴承与轴配合时可采用( )。___
A. 定向装配
B. 固定装配
C. 浮动装配
D. 互换装配
【单选题】
JLR D8 PHEV 的断开机构是靠那种方式实现的___
A. 液压推动式
B. 机械推动式
C. 电磁推动式
【单选题】
VOLVO主减速器装配选用的齿轮类型:___
A. 弧齿锥齿轮
B. 圆柱齿轮
C. 双曲面齿轮
D. 涡轮蜗杆
【单选题】
主、从动齿轮装配精度的影响因素,不包括下面哪一项___
A. 齿轮的加工质量
B. 调整垫片
C. 轴承压装
D. 油封压装
【单选题】
M24x2-5g6g 6g的公差带是___
【单选题】
正离焦激光焊接是激光聚焦面处于加工工件表面的:___
【单选题】
使用滚切法(Face hob)加工的准双曲面齿轮为___
A. 收缩齿
B. 渐开齿
C. 等高齿
D. 交叉齿
【单选题】
MMeT装配线是使用AGV(Automatic Guided Vehicle)小车进行物料在工位间转运,请问下面那一项不是AGV小车的特性?___
A. 按下启动键后,AGV沿着磁性轨道自动行驶
B. 固定点位自动充电
C. 自动上下物料
D. 区域感应防止行驶时撞击操作工
【单选题】
实轴喷粉的厚度要求为:___
A. 80-100um
B. 60-150cm
C. 60-150um
D. 80-100cm
【单选题】
关于网带炉下面说法错误的是:___
A. 按照工艺要求设置参数
B. 每两小时抽样检测回火硬度
C. 当回火硬度偏低时,应增加回火炉温度
D. 当回火炉硬度偏高时,应在满足工艺的前提下,降低网带速度
【单选题】
自动化(Automation)是指机器设备、系统或过程(生产、管理过程)在没有人或较少人的直接参与下,按照人的要求,经过自动检测、信息处理、___、操纵控制,实现预期的目标的过程。___
A. 机构动作
B. 分析判断
C. 信息整合
D. 闭环反馈
【单选题】
AGV(自动导引运输车),指装备有电磁或光学等自动导引装置,___,具有安全保护以及各种移载功能的运输车___
A. 能够由驾驶员驾驶
B. 能够由编程控制
C. 能够沿规定的导引路径行驶
D. 能够由无线控制器控制
【单选题】
花键球形过度相比圆弧过度的优点是: ___
A. 减小应力集中
B. 易于加工
C. 美观
D. 方便测量