刷题
导入试题
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
推荐试题
【单选题】
在对来自黄热病疫区的集装箱和货物进行检疫查验时,应注意其中是否携带____。
A. 埃及伊蚊
B. 白纹伊蚊
C. 中华按蚊
D. 淡色库蚊
【单选题】
《国境卫生检疫法施细则》所称的“就地诊验”是指一个人在____期间,到就近的海关或者其他医疗卫生单位去接受诊察和检验;或者海关、其他医疗卫生单位到该人员的居留地,对其进行诊察和检验。
A. 在海关指定的
B. 中国居留
C. 患某种监测传染病
D. 患某种检疫传染病
【单选题】
海关发现染疫人时,应当立即将其____,防止任何人遭受感染。
A. 留验
B. 就地诊验
C. 临床治疗
D. 隔离
【单选题】
《传染病防治法》中规定,目前我国将传染病分____类。
A. 二类
B. 三类
C. 四类
D. 六类
【单选题】
国境口岸卫生要求控制啮齿动物、病媒昆虫的密度降低到_____程度。
A. 最低
B. 最小
C. 不足为害
D. 一定
【单选题】
对染有黄热病的船舶,在没有完成灭蚊以前限制该船与陆地和其他船舶的距离不少于____。
A. 100米
B. 200米
C. 300米
D. 400米
【单选题】
船方或其代理人应当在货轮驶离口岸前____内,到海关办理出境检疫手续。
A. 4小时
B. 8小时
C. 12小时
D. 24小时
【单选题】
悬挂检疫信号的船舶,除____和经海关许可的人员外,其他人员不准上船。
A. 码头工作人员
B. 边防人员
C. 港务监督人员
D. 引航员
【单选题】
海关应当阻止患有____、传染性肺结核病或者有可能对公共卫生造成重大危害的其他传染病的外国人入境。
A. 严重精神病
B. 艾滋病
C. 梅毒
D. 淋病
【单选题】
患____疾病死亡的尸体不必立即消毒、就近火化。
A. 鼠疫
B. 霍乱
C. 肺炭疽
D. 肺结核
【单选题】
对鼠疫染疫嫌疑人,实施不超过____的就地诊验或留验。
A. 3天
B. 4天
C. 5天
D. 6天
【单选题】
对无有效黄热病预防接种证书的员工旅客,可以从该人员离开感染环境的时候算起,实施____的留验。
A. 6日
B. 5日
C. 15日
D. 30日
【单选题】
发现疑似检疫传染病应以最快方法报告国务院卫生行政部门,最迟不得超过____。
A. 6小时
B. 12小时
C. 24小时
D. 36小时
【单选题】
对可疑病例进行采血等实验室检查时,需请旅客填写____。
A. 《出入境人员携带物留验/处理凭证》
B. 《口岸传染病可疑病例筛查参考表》
C. 《入/出境特殊物品卫生检疫审批单》
D. 《采样知情同意书》
【单选题】
决定接触者检疫期限的依据是____。
A. 疾病的传染期
B. 法定传染病的种类
C. 接触程度
D. 最后接触之日至该病最长潜伏期
【单选题】
基孔肯雅热病例的典型临床表现中的“三联征”指的是:____。
A. 发热、关节痛/关节炎及皮疹三联征
B. 发热、肌肉痛及皮疹三联征
C. 发热、关节痛/关节炎及意识障碍三联征
D. 头痛、呼吸衰竭及剧烈抽搐三联征
【单选题】
____不属于艾滋病传播途径。
A. 性传播
B. 母婴传播
C. 消化道传播
D. 血液传播
【单选题】
来自黄热病疫区的机组人员,在入境时,必须向海关出示有效的____。
A. 健康申明卡
B. 灭蚊证书
C. 黄热病预防接种证书
D. 体检证明
【单选题】
运输工具系统结合新一代风控系统提前下达至运输工具系统的登临检查指令和检查作业项对人员技能要求,随机选取能够满足检查要求的_____或以上关员执行检查任务。
A. 1名
B. 2名
C. 3名
D. 4名
【单选题】
检查船舶(邮轮)压舱水时,重点监督来自____疫区船舶的压舱水。
A. 黄热病
B. 非洲猪瘟
C. 登革热
D. 霍乱
【单选题】
电讯检疫是指进出境船舶通过无线通讯或其他便捷通讯方式,按要求向海关申报规定内容。经海关进行风险评估,认为其符合卫生检疫要求,准予其“无疫通行”,____登交通工具卫生检疫。
A. 可以实施也可以不实施
B. 不实施
C. 实施简单的
D. 但仍需实施
【单选题】
对4周内来自或者途径重点关注传染病(除检疫传染病)受染国家(地区)的入境船舶,应当实施_____检疫。
A. 锚地检疫
B. 靠泊检疫(登临检查)
C. 电讯检疫
D. 随船检疫
【单选题】
出境特殊物品的货主或者其代理人应当在出境前凭《特殊物品审批单》及其他材料向_____报检。
A. 其入境口岸海关
B. 其出境口岸海关
C. 其所在地海关
D. 海关总署
【单选题】
______负责辖区内出入境特殊物品的卫生检疫审批工作。
A. 海关总署
B. 直属海关
C. 隶属海关
D. 卫生健康委员会
【单选题】
申请特殊物品审批应当提供的材料不包括:____。
A. 《入/出境特殊物品卫生检疫审批申请表》
B. 出入境特殊物品描述性材料,包括特殊物品中英文名称、类别、成分、来源、用途、主要销售渠道、输出输入的国家或者地区、生产商等
C. 出境用于预防、诊断、治疗的人类疾病的生物制品、人体血液制品,应当提供药品监督管理部门出具的销售证明
D. 出入境高致病性病原微生物菌(毒)种或者样本的,应当提供市级以上人民政府卫生主管部门的批准文件
【单选题】
含有或者可能含有病原微生物、毒素等生物安全危害因子的入境特殊物品,口岸海关实施现场查验后应当及时电子转单给目的地海关。目的地海关应当实施_____。
A. 日常监管
B. 现场考核
C. 后续监管
D. 风险管理
【单选题】
携带自用且仅限于预防或者治疗疾病用的血液制品或者生物制品出入境的,不需办理卫生检疫审批手续,出入境时应当向海关出示医院的有关证明;允许携带量以处方或者说明书确定的____为限。
A. 一个疗程
B. 两个疗程
C. 三个疗程
D. 四个疗程
【单选题】
海关对出入境特殊物品实施风险管理,根据出入境特殊物品可能传播人类疾病的风险对不同风险程度的特殊物品划分为不同的____,并采取不同的卫生检疫监管方式。
A. 量化等级
B. 风险等级
C. 卫生等级
D. 检疫等级
【单选题】
出入境特殊物品的风险等级及其对应的卫生检疫监管方式由_____统一公布。
A. 海关总署
B. 直属海关
C. 隶属海关
D. 卫生健康委员会
【单选题】
根据特殊物品风险分级目录,海关对特殊物品检疫审批实施分级管理。其中B级特殊物品审批单的有效期为____。
A. 3个月
B. 6个月
C. 12个月
D. 24个月
【单选题】
含有或者可能含有高致病性病原微生物的特殊物品,其《特殊物品审批单》有效期为______。
A. 3个月
B. 6个月
C. 12个月
D. 24个月
【单选题】
入境特殊物品的货主或者其代理人应当在特殊物品交运前向______申请特殊物品审批。
A. 目的地海关总署
B. 目的地直属海关
C. 所在地海关总署
D. 所在地直属海关
【单选题】
申请从事检疫处理的单位或者人员隐瞒有关情况或者提供虚假申请材料的,直属海关不予受理或者不予颁发《核准证书》或者《从业证》,申请单位或者人员_____内不得再次申请。
A. 1年
B. 2年
C. 3年
D. 4年
【单选题】
____是指从自然界分离纯化或者经人工选育等现代生物技术手段获得的,主要用于水、大气、土壤、固体废物污染检测、治理和修复的一种或者多种微生物菌种。
A. 多元微生物菌剂
B. 再生微生物菌剂
C. 环保微生物菌剂
D. 特殊物品
【单选题】
环保用微生物菌剂的《卫生检疫审批单》只能使用一次,有效期限为_____。
A. 30天
B. 60天
C. 90天
D. 120天
【单选题】
对未进境交通工具要求实施指定地点登临检疫,对船舶应要求在明显位置悬挂检疫信号,白天为“QQ”字旗,夜间为“____”四盏灯光信号。
A. 白、红、白、红
B. 红、红、白、白
C. 红、白、白、红
D. 红、红、白、红
【单选题】
对装运出口易腐烂变质食品、冷冻品的船舱,必须在装货前申请_____,取得检验证书。
A. 备案管理
B. 分类管理
C. 装载检验
D. 适载检验
【单选题】
对进出境货物实施____管理,根据风险评估,将风险划分为高度风险、中度风险、低度风险三个等级。
A. 动态风险
B. 风险
C. 评级
D. 分层
【单选题】
货物卫生检疫查验方法包括:____检查和卫生学检查。
A. 医学媒介生物
B. 生物
C. 病毒
D. 细菌
【单选题】
对进出境货物卫生检疫不合格案例,相关纸质档案资料属于入境的应保存____,属于出境的应保存2年,电子数据应长期保存,涉及重大疫情和案件、典型案例等事项的档案,作长期或永久保存。
A. 3年
B. 5年
C. 1年
D. 2年
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用