刷题
导入试题
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
推荐试题
【单选题】
___0301.( )是指防止高处作业人员发生坠落或发生坠落后将作业人员安全悬挂的个体防护装备。
A. 缓冲带
B. 安全绳
C. 自锁器
D. 安全带
【单选题】
___0302.通过围绕在固定构造物上的绳或带将人体绑定在固定构造物附近,使作业人员的双手可以进行其他操作的安全带是( )。
A. 围杆作业安全带
B. 区域限制安全带
C. 坠落悬挂安全带
D. 主带
【单选题】
___0303.用以限制作业人员的活动范围,避免其到达可能发生坠落区域的安全带是( )。
A. 辅带
B. 区域限制安全带
C. 坠落悬挂安全带
D. 围杆作业安全带
【单选题】
___0304.高处作业或登高人员发生坠落时,将作业人员安全悬挂的安全带是( )。
A. 系带
B. 区域限制安全带
C. 坠落悬挂安全带
D. 辅带
【单选题】
___0305.在安全带中连接系带与挂点的绳(带、钢丝绳)是( )。
A. 围杆作业安全带
B. 区域限制安全带
C. 坠落悬挂安全带
D. 安全绳
【单选题】
___0306.安全带中系带中承受冲击力的带是( )。
A. 缓冲器
B. 主带
C. 系带
D. 辅带
【单选题】
___0307.安全带中用于调节主带或辅带长度的零件是( )。
A. 调节扣
B. 扎紧扣
C. 护腰带
D. 连接器
【单选题】
___0308.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。艳绿色,表示管道内是( )。
A. 水
B. 水蒸气
C. 空气
D. 气体
【单选题】
___0309.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。大红色,表示管道内是( )。
A. 水
B. 水蒸气
C. 空气
D. 气体
【单选题】
___0310.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。淡灰色,表示管道内是( )。
A. 水
B. 水蒸气
C. 空气
D. 气体
【单选题】
___0311.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。中黄色,表示管道内是( )。
A. 水
B. 水蒸气
C. 空气
D. 气体
【单选题】
___0312.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。紫色,表示管道内是( )。
A. 酸或碱
B. 可燃液体
C. 其他液体
D. 氧
【单选题】
___0313.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。棕色,表示管道内是( )。
A. 酸或碱
B. 可燃液体
C. 其他液体
D. 氧
【单选题】
___0314.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。黑色,表示管道内是( )。
A. 酸或碱
B. 可燃液体
C. 其他液体
D. 氧
【单选题】
___0315.工业管道的基本识别色,根据管道内物质的一般性能,分为八类。淡蓝色,表示管道内是( )。
A. 酸或碱
B. 可燃液体
C. 其他液体
D. 氧
【单选题】
___0316.纺织生产车间或者作业场所应当严格控制( )排放。
A. 污水
B. 废气
C. 噪声
D. 粉尘
【单选题】
___0317.施工现场应建立( )垃圾站,建筑物内施工垃圾的清运要采用密闭容器吊运。
A. 箱式
B. 敞开式
C. 开放式
D. 封闭式
【单选题】
___0318.施工现场的强噪声设备宜设置在( )居民区的一侧。
A. 周围
B. 附近
C. 靠近
D. 远离
【单选题】
___0319.依据《加油站作业安全规范》(AQ 3010—2007),当加油站( )时,应立即停止加油。
A. 有油罐车送油
B. 其他作业人员卸油
C. 有人使用非防爆移动通信工具
D. 有其他车辆驶入加油站
【单选题】
___0320.《加油站作业安全规范》(AQ 3010—2007)规定,油罐( ),应适时测试油罐油气浓度,并采取相应的安全和个体防护措施。
A. 清洗前
B. 作业中
C. 清洗后
D. 清洗前和作业中
【单选题】
___0321.造成建筑物墙体开裂的最主要原因是( )。
A. 外来震动
B. 土体水平运动
C. 基础不均匀沉降
D. 降雨
【单选题】
___0322.为了防止雨水和沙尘侵入施工现场的配电箱,配电箱导线的进出口必须设在( )。
A. 箱体底面
B. 箱体顶面
C. 箱体侧面
D. 箱体后面
【单选题】
___0323.人工挖扩桩孔在下孔作业前,应( )孔内有害气体,并向孔内输入新鲜空气或氧气。
A. 稀释
B. 注意
C. 检测
D. 排除
【单选题】
___0324.供油站、煤气柜、乙炔站等火灾和爆炸危险性较大的及产生有毒有害气体的设施,应位于厂区和居住区( )。
A. 常年最小频率风向的上风侧
B. 常年最小频率风向的下风侧
C. 常年主导频率风向的上风侧
D. 夏季主导频率风向的上风侧
【单选题】
___0325.车间安全通道是为了( )设置的。
A. 保证人员流动
B. 保证职工通行
C. 抢险救灾
D. 保证人员逃生
【单选题】
___0326.遇有( )以上大风天气不得进行土方回填、转运以及其他可能产生扬尘污染的施工。
A. 六级
B. 四级
C. 五级
D. 三级
【单选题】
___0327.拆模过程中如遇中途停歇,应将已松扣的钢模板及支撑件( )。
A. 拆下运走
B. 架空支撑
C. 专人看管
D. 简单连接
【单选题】
___0328.伸缩缝和后浇带处,应加( )防护,并加警示标识。
A. 钢筋网
B. 活动盖板
C. 固定盖板
D. 脚手板
【单选题】
___0329.装载机铲斗下方严禁有人,严禁用铲斗( )。
A. 载人
B. 载物
C. 载器材
D. 载机械
【单选题】
___0330.施工现场临时架空线路必须采用( )和专用电杆,严禁采用裸导线架设在树木上、脚手架上。
A. 绝缘导线
B. 铁导线
C. 铝导线
D. 双绞线
【单选题】
___0331.在建筑安装过程中,如果上下两层同时工作,上下两层间必须设有( )或者其他隔离设施。
A. 专用的防护棚
B. 专用的防护罩
C. 专用的防护顶板
D. 专用的防护脚手板
【单选题】
___0332.遇有( )以上大风天气不得进行土方回填、转运以及其他可能产生扬尘污染的施工。
A. 六级
B. 四级
C. 五级
D. 三级
【单选题】
___0333.拆模过程中如遇中途停歇,应将已松扣的钢模板及支撑件( )。
A. 拆下运走
B. 架空支撑
C. 专人看管
D. 简单连接
【单选题】
___0334.伸缩缝和后浇带处,应加( )防护,并加警示标识。
A. 钢筋网
B. 活动盖板
C. 固定盖板
D. 脚手板
【单选题】
___0335.装载机铲斗下方严禁有人,严禁用铲斗( )。
A. 载人
B. 载物
C. 载器材
D. 载机械
【单选题】
___0336.物料提升机必须设置( )等安全装置。
A. 超力矩保护装置
B. 行走限位
C. 变幅限位器
D. 超高限位装置
【单选题】
___0337.施工现场临时架空线路必须采用( )和专用电杆,严禁采用裸导线架设在树木上、脚手架上。
A. 绝缘导线
B. 铁导线
C. 铝导线
D. 双绞线
【单选题】
___0338.在建筑安装过程中,如果上下两层同时工作,上下两层间必须设有( )或者其他隔离设施。
A. 专用的防护棚
B. 专用的防护罩
C. 专用的防护顶板
D. 专用的防护脚手板
【单选题】
___0339.人员密集场所需要使用易燃易爆化学物品时,应根据需要限量使用,存储量不应超过( )的使用量,且应由专人管理、登记。
A. 一天
B. 两天
C. 三天
D. 四天
【单选题】
___0340.《体育场馆公共安全通用要求》(GB 22185—2008)规定,按照体育场馆的规模及举办活动的级别、可能产生的危害程度等将体育场馆单位风险等级分为( )。
A. 两级
B. 三级
C. 四级
D. 五级
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用