【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
推荐试题
【单选题】
某单费率不满1千伏“一户一表”居民客户A,假设2015年10月5日过户给客户B,抄表例日为每个月的7日。则A、B客户的年阶梯电量分别按___个月算。
A. 10、2
B. 9、3
C. 11、2
D. 10、3
【单选题】
客户提交资料中房屋产权证明或其他证明文书包括___。
A. 公安机关户籍证明
B. 宗教活动场所登记证
C. 城建根据所辖权限开具产权合法证明
D. 社会团体法人登记证书
【单选题】
居民家庭安装电动汽车充电设施执行居民(合表)电价,不满1千伏用户的居民(合表)电价为每千瓦时___元。
A. 0.538
B. 0.568
C. 0.558
D. 0.588
【单选题】
用户连续___个月不用电,也不申请办理暂停用电手续者,供电企业须以销户终止其用电。用户需再用电时,按新装用电办理。
【单选题】
减容后如果客户申请按照最大需量计算基本电费的,对减容部分按照减容变压器容量(千伏安视同千瓦)的___的一半计算需量电费。
A. 0.3
B. 0.4
C. 0.5
D. 0.8
【单选题】
电e宝客服电话是多少?___
A. 400-60-95598
B. 400-70-95598
C. 400-80-95598
D. 400-90-95598
【单选题】
电费小红包是由___发行。
A. 掌上电力
B. 电e宝
C. e充电
D. 财富好管家
【单选题】
可以缴纳电费的公司线上渠道不包括___。
A. 掌上电力
B. 电e宝
C. 95598网站
D. 95598客服热线
【单选题】
如果客户对表计申校结果仍不认可,建议客户可向当地___提出校验申请。
A. 消费者协会
B. 质量技术监督部门
C. 工商管理部门
D. 综合执法局
【单选题】
以下哪种资料是办理低压居民新装用电不需要的?___
A. 房产证复印件或相关法律文书
B. 客户居民身份证原件
C. 上一期电费缴讫凭证
D. 经办人居民身份证原件
【单选题】
“三型一化”转型应坚持创新原则。创新营业厅服务功能与手段,通过移动应用、信息技术、智能设备等手段,体现___导向;通过客户标签、客户细分并实施差异化服务策略,体现( )导向;通过互动环节、体验设备等“参与感”功能的部署,体现( )导向。
A. 智能型、市场型、体验型
B. 智能型、体验型、市场型
C. 市场型、体验型、智能型
D. 智能型、差异型、体验型
【单选题】
省公司营业厅转型发展三年行动计划提出,将通过三年的努力,全面建成以智能型、市场型、体验型、线上线下一体化(“三型一化”)为特征的实体供电营业厅网络,打造以___为中心的现代服务体系。
A. 市场
B. 人民
C. 客户
D. 电力市场
【单选题】
省公司营业厅转型发展三年行动计划提出,要___A级厅,A级厅是本地市供电区域内旗舰厅,应设置引导、业务待办、业务办理、自助服务、线上体验、大客户服务、展示等功能区域,凸显展示和体验功能。
【单选题】
省公司营业厅转型发展三年行动计划提出,要转变营业厅传统单一的服务模式,为客户提供一站式业务办理和一体化智慧用能服务,促进“互联网+产品”体验、应用落地和推广;开展跨界商业合作,形成以营业厅作为实体展示窗口,构建___的“4+”生态服务运营模式。
A. 客户+渠道+产品+合作商
B. 客户+服务+产品+合作商
C. 用户+渠道+产品+合作商
D. 客户+渠道+服务+合作商
【单选题】
省公司营业厅转型发展三年行动计划总体目标为,围绕国网公司和省公司决策部署,以创新、效率、效益为原则,以“互联网+”及信息技术为手段,以线上线下一体化为途径,以为___重点,做强A级厅、做精B级厅、做活C级厅、整合D级厅。
A. 综合服务、智能服务、体验服务
B. 综合服务、智能服务、差异服务
C. 综合服务、差异服务、体验服务
D. 综合服务、智能服务、优质服务
【单选题】
受理客户咨询、渠道推广业务应在营业厅综合服务平台发起___,实现业务电子流转、流程闭环管控。
A. 综合业务
B. 杂项业务
C. 咨询业务
D. 渠道业务
【单选题】
营业厅“三型一化”转型具体是指构建以智能型、市场型、体验型、___为特征的实体供电营业厅。
A. 前台后台协同化
B. 线上线下一体化
C. 前端后台一体化
D. 客户服务差异化
【单选题】
营业厅“三型一化”转型应坚持效益原则,探索建立营业厅综合效益评价指标体系,推动营业厅向___、提高效率和增加效益转型。
A. 服务客户
B. 服务用户
C. 服务大客户
D. 服务市场
【单选题】
抄表催费投诉包括催缴费投诉、欠费停复电投诉以及___。
A. 抄表
B. 抄催人员服务态度
C. 抄催人员服务规范
D. 电费
【单选题】
对于有明确证据证明客户诉求与事实不符或不存在的投诉,进行申诉时应选择___
A. 客户自身责任
B. 恶意投诉
C. 不合理投诉
D. 客服代表责任
【单选题】
供电企业在接到居民用户家用电器损坏投诉后,应在___内派员赴现进行调查、核实。
A. 12小时
B. 24小时
C. 36小时
D. 48小时
【单选题】
下列哪组用语为服务忌语___
A. “您好,请坐。”
B. “我现在有事,你等会儿。”
C. “请问您需要办理什么业务?”
D. “感谢您的评价。”
【单选题】
下列选项中不属于《国家电网公司员工服务“十个不准”》的是___。
A. 不准利用职务之便接收客户请吃
B. 不准违反首问负责制,推诿、搪塞、怠慢客户
C. 不准违反业务办理告知要求,造成客户重复往返
D. 不准营业窗口擅自离岗或做与工作无关的事
【单选题】
下列一二级申诉类别对应正确的是___
A. 业务类型错误-客户自身责任
B. 业务子类错误-恶意投诉
C. 重复诉求-不合理投诉
D. 业务类型错误-受理错误
【单选题】
营业厅人员服务规范投诉反映营业厅服务人员未履行“首问负责”、___、 “限时办结”制;未正确引导客户办理业务;或干与工作无关事情;违诺等服务规范问题。
A. 承诺兑现
B. 客户优先
C. 一次告知
D. 以上均不对
【单选题】
营业厅投诉,需提供___个月内的音频、视频。
【单选题】
B级及以下营业厅每年至少组织___应急演练
【单选题】
根据《国网浙江省电力公司供电营业厅管控规范》的要求,各级营业厅每年至少组织___应急演练,并做好记录工作。
【单选题】
根据《国网浙江省电力公司供电营业厅管控规范》的要求,各级营业厅每年至少组织___应急演练,并做好记录工作。
【单选题】
认真总结本次演练经验,发现问题,制定措施,修订完善系统故障应急预案,提高预案的___。
A. 可选择性
B. 可操作性
C. 可预防性
D. 可提高性
【单选题】
一般建议___营业厅每年至少组织两次应急演练。
【单选题】
以下不属于应急演练范畴的是?___
A. 营销系统故障
B. 个人电脑故障
C. 突发停电
D. 办理新型业务
【单选题】
以下演练脚本中,哪种演练需要较多参演人员?___
A. 电脑故障
B. 排队人数激增
C. 自助服务机故障
D. 客户情绪激动
【单选题】
由___宣布演练结束,各岗位人员恢复正常工作,并做好相关记录。
A. 服务人员
B. 客户
C. 营业厅主管
D. 保安
【单选题】
员工要反映迅速,做到___、早报告、早控制。
A. 早预防
B. 早准备
C. 早发现
D. 早结束
【单选题】
客户移表须向供电企业提出申请,移表费用应由 ___承担。
A. 供电企业和客户协商;
B. 供电企业;
C. 客户;
D. 平均分担
【单选题】
《供电营业规则》规定,为加强供电营业管理,建立正常的供电营业秩序,保障供用双方的合法权益,根据___和国家有关规则,制定本规则。
A. 《电力供应与使用条例》;
B. 《电力法》;
C. 《供电营业规则》;
D. 《电费抄核收工作标准》
【单选题】
供电企业应在用户每一个受电点内按不同电价类别,分别安装用电计量装置。每个___作为用户的一个计费单位。
A. 受电点;
B. 计量点;
C. 用电装置;
D. 受电设备
【单选题】
计费计量装置接线错误的,以___为基数,按正确与错误接线的差额率退补电量,退补时间从上次校验或换装投入之日起至接线错误更正之日止。
A. 允许电压降;
B. 正常月份的用电量;
C. 实际记录的电量;
D. “0”误差
【单选题】
《供电营业规则》规定,窃电时间无法查明时,窃电日数至少以一百八十天计算,每日窃电时间:电力用户按___小时计算;照明用户按___小时计算。___(窃电容量)
A. 8、6;
B. 12、6;
C. 12、8;
D. 24、8