刷题
导入试题
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
推荐试题
【多选题】
麦克风声音要做到以下几项___
A. 清晰
B. 自然
C. 圆满
D. 尾音清楚
【多选题】
目前消防部队电视电话会议系统分为那几级网络___
A. 一级网为公安部消防局至消防总队的电视电话会议网,
B. 二级网为消防总队至消防支队的电视电话会议网,
C. 三级网为消防支队至消防大队的电视电话会议网
D. 四级网为消防支队至当地公安局电视电话会议网
【多选题】
目前公安消防部队视频会议系统主要有哪几部分组成___
A. 多点控制单元
B. 视频会议终端
C. 视频录播服务器
D. 摄像机、麦克风等辅助设备
【多选题】
视频会议系统会议中终端开启后没有声音输出,需要进行那些操作排除故障___
A. 请检查线音频线缆是否连接正确,音频外设是否工作正常;
B. 检查音频输入线路异常;
C. 检查音频输出线路异常;
D. 终端的音量是否太低或为静音状态
E. 通过“诊断”界面,进行声音测试,检查声音的输入输出是否正常。
【多选题】
192语音综合管理平台关键设备有___
A. 语音综合管理平台主机
B. 远程互联终端
C. 录音终端。
D. VOIP
【多选题】
灭火救援指挥系统在警情受理方面的“多个突破”有___
A. 手机报警定位,地图直观判断。
B. 支队大集中受理警情模式改革(与中队远程接警混合) 。
C. 接警软件与硬件系统接口标准化。
D. 跨区域、跨警种的警情转接和语音联合调度。
【多选题】
消防接处警系统出现中队与支队或支队与总队系统无法链接,在确保指挥网整体正常的情况下,应怎么处理___
A. 进行互ping操作
B. 排查链路故障
C. 排查交换机故障
D. 排查服务器故障
【多选题】
通过消防接处警系统选择调派车辆,点击【出车】后,系统将产生哪些动作___
A. 系统会向所有的车辆所属中队子系统发送派车命令和出车单,自动拨打主管中队电话。
B. 如果派车命令正常下发,并且中队确认,在“中队反馈信息栏”中将显示反馈信息。
C. 如果中队收到派车命令但未确认,将出现中队未确认的提示框。
D. 如果派车命令未正常下发,将出现中队未收到的提示框。
【多选题】
接警员通过消防接处警系统接报群众报警,摘机后须确认哪些基本案情信息___
A. 报警人联系方式
B. 案件地址
C. 案件类型
D. 主管中队。
【多选题】
抢险救援案件现场信息栏须填写的内容包括哪些___
A. 抢险救援种类
B. 现场情况
C. 被困人员
D. 案件等级。
【多选题】
灭火救援指挥系统指挥决策管理子系统具有哪些功能___
A. 提供了丰富的数学应用计算公式模型,
B. 为指挥调度系统和预案管理系统提供了车辆调集接口功能
C. 实现了和预案、水源、执勤实力等的无缝集成
D. 提供了化学危险品查询功能,以及消防知识库建设管理功能。
【多选题】
灭火救援指挥系统灭火救援圈分析包括哪些分析?___
A. 车辆圈分析
B. 药剂圈分析
C. 器材圈分析
D. 人员圈分析
【多选题】
信息加密的目的是为了保护网络内的___。(难)(基础知识)
A. 数据
B. 文件
C. 口令
D. 控制信息
E. 网络设备
【多选题】
程控交换机的控制系统包括___。(难)(基础知识)
A. 微处理机
B. 程序模块
C. 信令设备
D. 用户集线器
E. 各种中继器
【多选题】
网络安全管理的原则包括___。(难)(消防通信网络设备)
A. 多人负责制原则
B. 任期有限原则
C. 职责分离原则
D. 最大权限原则
E. 最小权限原则
【多选题】
安全管理是网络管理中心的重要职责,主要包括___。(易)(消防通信网络设备)
A. 安全政策的制定与实施
B. 用户及域名注册管理
C. 密钥管理
D. 安全监控
E. 入侵检测
【多选题】
下列描述哪些是采用VLAN的优势?___。(难)(消防通信网络设备)
A. 分割了广播域
B. 分割了冲突域
C. 提高了网络的安全性
D. 提高了交换机的转发速度
【多选题】
网络安全检查内容包括___。(中)(基础知识)
A. 网络边界
B. 主机安全
C. 网络防火墙
D. 网站内容
E. 终端用户注册情况
【多选题】
常用的接入Internet的方式有哪些?___(中)(基础知识)
A. 以专线接入
B. 使用电话调制解调器拨号上网
C. 通过主干局域网接入
D. 通过ISDN接入
E. 通过宽带ADSL接入
F. 正在发展的其他宽带接入。
【多选题】
应急通信的组织实施中,下面哪两项是关于前期组织的内容。___(中)(应急通信)
A. 出动准备
B. 集成运输
C. 准备车辆;
D. 维修器材
E. 购买发电机
F. 临时确定人员。
【多选题】
下列哪些是常用的视频编码标准,请列出___(难)(音视频系统)
A. H.261、H.263;
B. H.264、MPEG-4;
C. G.711、G.722;G.729;
D. H265、MPEG-2。
【多选题】
根据消防指挥体系划分,现场通信保障人员可分为哪几级?___(中)(应急通信)
A. 中队级
B. 支队级
C. 总队级
D. 部局级
【多选题】
中队级现场通信保障人员的职责和任务有哪些?___(中)(应急通信)
A. 负责本中队指挥员与大队的通信联络
B. 负责本中队指挥员与支队的通信联络
C. 负责本辖区内较大灭火与应急救援行动的初期保障
D. 负责上级通信人员到场时,通信保障工作
【多选题】
网路通信按网内联络关系不同分为几种组织形式?___(中)(应急通信)
A. 纵式网
B. 横式网
C. 纵横式网
D. 立体网
【多选题】
短波背负台的天线主要有哪些?___(易)(应急通信)
A. 鞭状天线
B. 斜拉天线
C. 倒L形天线
D. 三线式天线
【多选题】
保障短波电台通信畅通的主要措施有哪些?___(中)(应急通信)
A. 科学选用频率
B. 正确选择电台开设位置
C. 合理选用电台和天线
D. 正确拟制和使用无线电台联络规定
E. 树立全局观念,搞好团结协作
【多选题】
手持台日常使用注意事项?___(易)(应急通信)
A. 防止振动与撞击
B. 防止潮湿和浸水
C. 防止灰尘
D. 在防爆场所不要使用手持台
E. 爱护键盘
【多选题】
应急通信的特点有哪些?___ (易)(应急通信)
A. 时间的突发性
B. 地点的不确定性
C. 地理环境的复杂性
D. 容量需求的不确定性
E. 通信保障的业务多样化
F. 现场应用的高度自主性
【多选题】
消防一级网的固定台一般设在___。(易)(应急通信)
A. 消防支队
B. 消防大队
C. 消防站
D. 指挥中心
【多选题】
优化短波通信的要素___ (中)(应急通信)
A. 正确选择和架设天线地线;
B. 正确选用工作频率;
C. 选用先进和优质的电台等设备
D. 选择合适的位置
【多选题】
电话录音系统的基本功能有哪些?___ (中)(应急通信)
A. 录音
B. 监听
C. 查询
D. 回放
E. 管理
【多选题】
程控交换机常见的两种供电方式的工作电压分别是多少?___ (难)(应急通信)
A. 直流12V
B. 直流48V
C. 交流220V
D. 交流240V
【多选题】
无线集群系统与常规系统有何不同?___ (易)(应急通信)
A. 集群系统信道利用率比常规系统高。
B. 集群通信系统的服务质量高,功能丰富。
C. 集群与常规相比具有通话私密性。
D. 集群系统具有交换功能,可联网。
E. 集群系统具有控制中心,具有控制管理功能。
【多选题】
无线集群通信系统的基站都应包含哪些设备?___ (难)(应急通信)
A. 基站控制器
B. 信道机,包括发射机、接收机和双工控制器。
C. 发射机合路器。
D. 接收机耦合器。
E. 天线,包括发射天线和接收天线,必要时可增配接收天线放大器。
F. 链路传输设备。
【多选题】
电台射频部分包括哪些模块?___ (易)(应急通信)
A. 功放模块
B. 压控振荡器
C. 接收模块
D. 功率控制电路
【多选题】
与地面微波中继、陆地移动通信相比,卫星通信的主要特点有哪些?___ (易)(应急通信)
A. 覆盖范围大。
B. 通信链路稳定。
C. 抗自然灾害能力强。
D. 通信费用与距离无关。
E. 能同时实现多个相距遥远的地球站之间的通信联接。
【多选题】
在某支队的火场无线通信三级组网中,中队指挥员在哪一级网上?___(中)(应急通信)
A. 一级网;
B. 二级网;
C. 三级网;
D. 四级网;
E. 管区覆盖网;
F. 火场指挥网。
【多选题】
在某支队的火场无线通信三级组网中,中队指挥员在无线通信网络中的任务是什么?___(中)(应急通信)
A. 接受上级指挥员的命令;
B. 负责指挥他的中队进行灭火工作;
C. 向总队指挥员报告情况;
D. 与自然水、天然气、电力等公司协同沟通;E
E. 与支队指挥中心联系;
【多选题】
在支队的火场无线通信组网中,火场指挥网是最容易混乱的一级网络,下列哪些是造成混乱的原因?___(中)(应急通信)
A. 是参与人数最多的一级网络;
B. 通信纪律差;
C. 呼叫不规范;
D. 电台数量少;
E. 通信员不够;
F. 大队、中队未配备通信指挥车。
【多选题】
支队火场无线通信三级组网中,因为第二级网是最混乱的一级网络,为了解决火场无线通信混乱的问题,下列哪些是主要的解决措施?___(难)(应急通信)
A. 购买新的通信指挥车;
B. 火场增加通信员;
C. 控制加入火场指挥网的人数;
D. 开设备用指挥网;
E. 规范火场通信呼号;
F. 加强火场通信纪律
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用