刷题
导入试题
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
推荐试题
【多选题】
关于意识的本质,唯心主义的错误在于 ___
A. 否认意识对物质的反作用
B. 夸大物质对意识的决定作用
C. 强调意识对物质的依赖关系
D. 否认意识对物质的依赖性
【多选题】
世界物质统一原理要求我们想问题、办事情必须 ___
A. 一切从群众意愿出发
B. 一切从已获得的经验出发
C. 一切从客观实际出发
D. 一切从理论原则出发
【多选题】
区别新旧事物的根本标志在于 ___
A. 是否受到多数人的拥护
B. 是否同历史发展的必然趋势相符合
C. 在形式上是否新奇
D. 出现时间的先后
【多选题】
矛盾的普遍性原理认为 ___
A. 事物发展过程的开始阶段只有差异,后来才有矛盾
B. 矛盾解决意味着矛盾终止
C. 矛盾只存在于事物发展的一定阶段
D. 矛盾存在于一切事物,贯穿于于一切事物发展过程的始终
【多选题】
辩证的否定是 ___
A. 事物的自我否定
B. 绝对的否定
C. 外力强加于事物的否定
D. 对事物的任意否定
【多选题】
矛盾是 ___
A. 事物内部或事物之间既对立又统一的关系
B. 对立面之间相互联系和转化的关系
C. 对立面之间的相互排斥、相互否定的关系
D. 主体和客体之间相互作用的关系
【多选题】
对立统一规律揭示了事物发展的 ___
A. 辩证形式
B. 趋势和道路
C. 不同状态和形式
D. 源泉和动力
【多选题】
质量互变规律揭示了事物发展的 ___
A. 辩证形式
B. 趋势和道路
C. 两种基本的状态和形式
D. 源泉和动力
【多选题】
“不积跬步,无以至千里,不积细流,无以成江河。”这段话说明了 ___
A. 质变是由量变引起的
B. 量变是由质变引起的
C. 质变和量变是相互渗透的
D. 量变在事物发展中是不起作用的
【多选题】
一个非常不错的成绩,然而,在一项环环相扣的连续不断的工作中,如果每个环节都打点折扣,最终得出的成绩就是不及格。”这里蕴含的辩证法道理是___
A. 肯定中包含否定
B. 量变引起质变
C. 必然性通过偶然性开辟道路
D. 可能和现实是相互转化的
【多选题】
“一刀切”的工作方法是 ___
A. 形而上学的方法
B. 相对主义的方法
C. 抓中心带动全盘的方法
D. 庸俗进化论的方法
【多选题】
“任何事物的存在和发展都是有条件的,一切以时间、地点、条件为转移。”这是一种___
A. 唯条件论观点
B. 外因论观点
C. 形而上学不变论观点
D. 唯物辩证法观点
【多选题】
发展的实质是 ___
A. 事物数量的增加或减少
B. 事物的简单重复和循环
C. 新事物的产生和旧事物的灭亡
D. 物体的位置移动或场所的变更
【多选题】
在量变过程中,事物呈现为 ___
A. 显著变化状态
B. 绝对静止状态
C. 相对静止状态
D. 飞跃状态
【多选题】
事物发展的两种基本状态是 ___
A. 肯定和否定
B. 量变和质变
C. 运动和静止
D. 同一和斗争
【多选题】
唯物辩证法和形而上学的根本分歧在于是否承认 ___
A. 事物之间的联系
B. 事物在联系中运动变化
C. 事物内部的矛盾性
D. 事物的客观实在性
【多选题】
辩证的否定就是扬弃,它是指 ___
A. 新的全盘抛弃旧的
B. 事物发展的连续性
C. 新事物对旧事物既批判又继承
D. 新事物对旧事物全盘继承
【多选题】
唯物辩证法的总观点和总特征是 ___
A. 运动变化的观点
B. 矛盾双方对立统一的观点
C. 联系和发展的观点
D. 运动和静止辩证统一的观点
【多选题】
唯物辩证法的实质和核心是 ___
A. 对立统一规律
B. 质量互变规律
C. 否定之否定规律
D. 普遍联系的规律
【多选题】
唯物辩证法认为,否定之否定的过程是 ___
A. 事物经过两次否定重新回到原来出发点的运动
B. 甲变乙,乙变丙,丙变丁的无穷发展
C. 事物经过两次否定达到自我发展、自我完善的过程
D. 事物在原有基础上的周而复始的循环
【多选题】
中国古代哲学家荀子说:“心不使焉,则白黑在前而目不见,雷鼓在侧而耳不闻。”这段话表明意识具有 ___
A. 客观性
B. 能动性
C. 对象性
D. 任意性
【多选题】
矛盾的基本属性是 ___
A. 普遍性和特殊性
B. 斗争性和同一性
C. 绝对性和相对性
D. 变动性和稳定性
【多选题】
“一把钥匙开一把锁”,这句话强调的是 ___
A. 要承认事物的客观性
B. 要承认事物运动的规律性
C. 要注重分析矛盾的普遍性
D. 要注重分析矛盾的特殊性
【多选题】
全盘否定中国传统文化的历史虚无主义,在哲学上是犯了 ___
A. 唯心主义先验论的错误
B. 经验论的错误
C. 形而上学否定观的错误
D. 激变论的错误
【多选题】
“旧唯物主义是半截子的唯物主义”,这是指 ___
A. 旧唯物主义是形而上学的唯物主义
B. 旧唯物主义在社会历史观上是唯心主义
C. 旧唯物主义是机械唯物主义
D. 旧唯物主义是割裂了运动与静止的辩证法
【多选题】
既是自然界与人类社会分化统一的历史前提,又是自然界与人类社会统一起来的现实基础,这指的是 ___
A. 运动
B. 实践
C. 精神生产
D. 物质生产
【多选题】
“沉舟侧畔千帆过,病树前头万木春。”“芳林新叶催陈叶,流水前波让后波。”这两句诗包含的哲学道理是 ___
A. 矛盾是事物发展的动力
B. 事物是本质和现象的统一
C. 事物的发展是量变和质变的统一
D. 新事物代替旧事物是事物发展的总趋势
【多选题】
度是 ___
A. 事物的质量和数量的界限
B. 事物保持其质的稳定性的数量界限
C. 事物保持其量的稳定性的范围
D. 事物发生变化的关节点
【多选题】
唯物主义哲学发展的三个基本历史形态是 ___
A. 形而上学唯物主义、庸俗唯物主义、辩证唯物主义
B. 古代朴素唯物主义、形而上学唯物主义、辩证唯物主义
C. 奴隶社会时期的唯物主义、封建社会时期的唯物主义、资本主义时期的唯物主义
D. 机械唯物主义、形而上学唯物主义、辩证唯物主义
【多选题】
哲学是 ___
A. 人们对各种具体事物的看法
B. 科学的世界观和方法论
C. 理论化、系统化的世界观  
D. 辩证唯物主义和历史唯物主义义观点
【多选题】
哲学上的两大阵营是指 ___
A. 唯物主义和唯心主义
B. 辩证法和形而上学
C. 一元论和二元论    
D. 可知论和不可知论
【多选题】
历史唯物主义的创立,使马克思主义哲学在内容上实现了 ___
A. 唯物主义和辩证法的统一
B. 唯物辩证的自然观和历史观的统一
C. 世界观和方法论的统一  D.理论和实践的统一
【多选题】
“人有多大胆,地有多大产;不怕办不到,就怕想不到;只要想得到,就能办得到。”这种说法从哲学上看是 ___
A. 坚持主观唯心主义的表现
B. 坚持客观唯心主义的表现
C. 坚持唯物辩证法的表现
D. 坚持形而上学否定观的表现
【多选题】
对哲学基本问题第一个方面内容的不同回答是 ___
A. 划分唯物主义和唯心主义的标准
B. 划分辩证法和形而上学的标准
C. 划分可知论和不可知论的标准
D. 划分辩证唯物主义和形而上学唯物主义的标准
【多选题】
对哲学基本问题第二个方面内容的不同回答是划分 ___
A. 唯物主义和唯心主义的标准
B. 辩证法和形而上学的标准
C. 可知论和不可知论的标准
D. 辩证唯物主义和形而上学唯物主义的标准
【多选题】
赫拉克利特提出“人不能两次踏进同一条河流”这是 ___
A. 诡辩论的观点
B. 辩证法的观点
C. 形而上学的观点
D. 变化发展的观点
【多选题】
克拉底鲁提出“人一次也不能踏进同一条河流”,这是 ___
A. 诡辩论的观点
B. 辩证法的观点
C. 相对主义的观点
D. 变化发展的观点
【多选题】
事物之间的联系具有以下特点:___
A. 客观性
B. 普遍性
C. 多样性
D. 有条件性
【多选题】
意识产生经历的阶段有 ___
A. 由一切物质都具有的反应特性到生命物质的刺激感应性
B. 由低等生物的刺激感应性到动物的感觉与心理
C. 由动物的感觉与心理到人的意识的产生
D. 由感性认识到理性认识
【多选题】
规律的客观性是指 ___
A. 规律不以人的意志为转移
B. 规律不能认识
C. 规律不能随意改变
D. 规律不能随意创造
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用