【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
推荐试题
【单选题】
职业道德是人们在职业工作和劳动中应遵循的与___紧密相联系的道德原则和规范总和。
A. 法律法规
B. 文化修养
C. 职业活动
D. 政策规定
【单选题】
职业道德品质的含义应包括___。
A. 职业观念、职业技能和职业良心
B. 职业良心、职业技能和职业自豪感
C. 职业良心、职业观念和职业自豪感
D. 职业观念、职业服务和受教育的程度
【单选题】
遵守职业道德的必要性和作用,体现在___。
A. 促进茶艺从业人员发展,与提高道德修养无关
B. 促进个人道德修养的提高,与促进行风建设无关
C. 促进行业良好风尚建设,与个人修养无关
D. 促进个人道德修养、行风建设和事业发展
【单选题】
茶艺师职业道德的基本准则,就是指___。
A. 遵守职业道德原则,热爱茶艺工作,不断提高服务质量
B. 精通业务,不断提高技能水平
C. 努力钻研业务,追求经济效益第
D. 提高自身修养,实现自我提高
【单选题】
开展道德评价具体体现在茶艺人员之间___。
A. 相互批评和监督
B. 批评与自我批评
C. 监督和揭发
D. 学习和攀比
【单选题】
下列选项中,___不属于培养职业道德修养的主要途径。
A. 积极参加社会实践
B. 强化道德意识
C. 提高自己的学历水平
D. 开展道德评价
【单选题】
下列选项中不属于尽心尽职具体体现的是___。
A. 尽力使品茶客人感到满意
B. 尽力发挥主观能动性
C. 尽力宣传表现自己
D. 尽力完成自己的工作任务
【单选题】
钻研业务、精益求精具体体现在茶艺师不但要主动、热情、耐心、周到地接待品茶客人,而且必须___。
A. 熟练掌握不同茶品的沏泡方法
B. 专门掌握本地茶品的沏泡方法
C. 专门掌握茶艺表演方法
D. 掌握保健茶或药用茶的湖泡方法
【单选题】
《神农本草》是最早记载茶为___的书籍。
【单选题】
清代茶叶已齐全___。
A. 七大茶类
B. 两大茶类
C. 六大茶类
D. 五大茶类
【单选题】
世界上第一部茶书的书名是___。
A. 《品茶要录》
B. 《茶具图赞》
C. 《榷茶》
D. 《茶经》
【单选题】
唐代饼茶的制作需经过的工序是___。
A. 煮、煎、滤
B. 炙、碾、罗
C. 蒸、春、煮
D. 烤、烫、切
【单选题】
宋代斗茶的主要内容是看___。
A. 香味、滋味
B. 汤色、汤花
C. 叶片、叶底
D. 汤稠、汤散
【单选题】
宋徽宗赵佶写有一部茶书,名为___
A. 《大观茶论》
B. 《品茗要录》
C. 《茶经》
D. 《茶谱》
【单选题】
茶树扦插繁殖后代的意义是能充分保持母株的___。
A. 早生早采的特性
B. 晚生迟采的特性
C. 高产和优质的特性
D. 性状和特性
【单选题】
茶树适宜在土质疏松,排水良好的___土壤中生长,以酸碱度PH值在4.5-5.5之间为最佳。
A. 中性
B. 酸性
C. 偏酸性
D. 微酸性
【单选题】
绿茶的发酵度:0。故属于不发酵茶类。其茶叶颜色翠绿,茶汤___
【单选题】
乌龙茶属青茶类,为半发酵茶,其茶叶呈深绿或青褐色,茶汤呈密绿或___色。
【单选题】
___茶具是和其他食物公用木制或陶制的碗,一器多用,没有专用茶具。
A. 原始社会
B. 西汉时期
C. 三国时期
D. 战国时期
【单选题】
___又称“三才碗”,蕴含“天盖之,地载之,人育之”的道理。
A. 兔毫盏
B. 玉书煨
C. 盖碗
D. 茶荷
【单选题】
___瓷器素有“薄如纸,白如玉,明如镜,声如磬”的美誉。
A. 福建德化
B. 河北唐山
C. 江西景德镇
D. 山东淄博
【单选题】
古人对泡茶水温十分讲究,认为“水嫩”,茶汤品质___。
A. 香味清高
B. 香味低淡
C. 香味馥郁
D. 滋味苦涩
【单选题】
判断好茶的客观标准主要从茶叶外形的匀整、色泽、___、净度来看。
【单选题】
在冲泡茶的基本程序中煮水的环节讲究___.
A. 不同茶叶品种所需水温不同
B. 不同茶叶外形煮水温度不同
C. 根据不同的茶具选择不同煮水器皿
D. 不同的茶叶品种所需时间不同
【单选题】
在冲泡茶的基本程序中,温壶(杯)的目的是___。
A. 主要是清洗茶具
B. 提高壶(杯)的温度,同时使茶具得到再次清洗
C. 将壶(杯)预热避免破碎
D. 主要是起到消毒杀菌的作用
【单选题】
在各种茶叶的冲泡程序中,茶叶的用量、___和茶叶的浸泡时间是冲泡技巧中的三个基本要素.
【单选题】
在味觉的感受中,舌头各部位的味蕾对不同滋味的感受不一样,___易感受鲜味。
【单选题】
在茶叶不同类型的滋味中,___型的代表茶是武夷岩茶、南安石亭绿等
【单选题】
冲泡绿茶时,通常一只容量为100-150mL的玻璃杯,投茶量为___。
A. 1-2g
B. 1-1.5g
C. 2-3g
D. 3-4g
【单选题】
茶叶中的咖啡碱不具有___作用。
A. 兴奋
B. 利尿
C. 调节体温
D. 抗衰老
【单选题】
茶叶中的___具有降血脂、降血糖、降血压的药理作用。
A. 氨基酸
B. 茶多酚
C. 叶绿素
D. 氟化物
【单选题】
茶叶中的维生素___是著名的抗氧化剂,具有防衰老的作用。
A. 维生素A
B. 维生素B
C. 维生素H
D. 维生素E
【单选题】
下列___属于茶叶国家强制性标准的内容。
A. 茶叶感官审评方法
B. 检验方法标准
C. 衡量检验方法
D. 微生物检验
【单选题】
按照标准的管理权限,下列___标准属于国家标准。
A. 《平炒青绿茶》
B. 《杭炒青绿茶》
C. 《西湖龙井》
D. 《紧压茶.紧茶》
【单选题】
关于劳动者权利表述错误的是___。
A. 取得劳动报酬的权利
B. 劳动者有权不服从工作安排
C. 享有平等就业和选择职业的权利
D. 获得劳动安全卫生保护的权利
【单选题】
在荷兰旅居的阿拉伯人喜爱饮___。
A. 红茶
B. 薄荷绿茶
C. 绿茶
D. 花茶
【单选题】
英国人冲泡热茶,烧水很讲究,他们必须用___现烧。