刷题
导入试题
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CD
解析
暂无解析
相关试题
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
推荐试题
【判断题】
按照《商业银行并购贷款风险管理指引》管理规定,商业银行贷款支持已获得目标企业控制权的并购方企业,为维持对目标企业的控制权而受让或者认购目标企业股权的,适用《商业银行并购贷款风险管理指引》
A. 对
B. 错
【判断题】
按照《商业银行并购贷款风险管理指引》管理规定,商业银行应在全面分析与并购有关的各项风险的基础上,建立审慎的财务模型,测算并购双方未来财务数据,以及对并购贷款风险有重要影响的关键财务杠杆和偿债能力指标
A. 对
B. 错
【判断题】
甲银行组织优质住房按揭贷款建立了资产池,并与华宝信托公司签署了资产证券化信托合同,将上述资产池信托予华宝公司,华宝公司根据《金融机构信贷资产证券化试点监督管理办法》的规定,依法成立信托计划,并拟向投资者发行受益证券,该证券发行说明书上载明:“本资产支持证券仅代表信托受益权的相应份额,不是信托计划或信托公司的负债。本公司以信托财产为限向投资机构承担支付资产支持证券收益的义务,不对信贷资产证券化业务活动中可能产生的其他损失承担义务和责任”
A. 对
B. 错
【判断题】
某国有银行为增强存量资产的流动性、减少风险资产、获得低成本融资,决定根据《中国银监会关于进一步加强信贷资产证券化业务管理工作的通知》的规定,挑选一批房地产按揭贷款资产进行证券化处理,基本业务模式为组建资产池,将资产包通过信托公司发行资产支持型证券,同时自持一部分证券以起到增信作用。该笔资产证券化业务完成后,该银行将上述资产整体出表,并对自持的证券进行风险隔离,严格监测和控制保留的风险
A. 对
B. 错
【判断题】
根据《商业银行代理保险业务监管指引》的规定,乙保险公司未对通过甲商业银行渠道销售的一年期以上的人身保险产品投保人进行犹豫期内回访
A. 对
B. 错
【判断题】
按照《商业银行稳健薪酬监管指引》规定,董事会按照国家有关法律和政策规定负责本行的薪酬管理制度和政策设计,并对薪酬管理负最终责任
A. 对
B. 错
【判断题】
某商业银行对该行高级管理层绩效薪酬采取了延期支付的方式,该行副行长王某2012年度的绩效薪酬总额为100万元,该行在当年向王某支付了40万元绩效薪酬,并计划分别在2013、2014、2015年度均向王某支付20万元绩效薪酬,按照《商业银行稳健薪酬监管指引》要求,该商业银行的这种做法是否正确?
A. 对
B. 错
【判断题】
某银行在2013年9月20日下发通知,在全行对存款新增指标予以重奖。全行员工个人营销新增活期存款在2014年12月31日突破1000万元的,予以奖励2万元。前述奖励行为是为商业银行取得更好经营业绩所创设,是一种商业行为,符合银监会《中国银监会办公厅关于银行业金融机构进一步做好绩效考评工作的意见》的要求。------
A. 对
B. 错
【单选题】
财务报表按主体范围分类,可分为___。
A. 中期报表和年度报表
B. 个别财务报表和合并财务报表
C. 动态报表和静态报表
D. 比较报表和静态报表
【单选题】
将本企业不同时期指标相比,也称___。
A. 横向比较
B. 趋势分析
C. 差异分析
D. 比率分析
【单选题】
将企业指标与行业平均数或竞争对手比较,称为___。
A. 趋势分析
B. 横向比较
C. 差异分析
D. 比率分析
【单选题】
下列属于差异分析的是___。
A. 与同行业比
B. 与本单位历史数据比
C. 实际与计划或预算比
D. 某个经济指标各个组成部分与总量的比
【单选题】
财务报表中某个项目不同时期的两项数值的比率称为 ___。
A. 动态比率
B. 相关比率
C. 结构比率
D. 标准比率
【单选题】
财务分析中应用比较分析法通常采用四类评价标准,其中有利于揭示企业财务状况变化趋势的标准是___。
A. 目标标准
B. 历史标准
C. 现行标准
D. 行业标准
【单选题】
“应收账款”科目明细账中若有贷方余额,应将其计入资产负债表中的___项目。(B)
A. 应收账款
B. 预收款项
C. 应付账款
D. 预付款项
【单选题】
某企业“应付账款”科目月末贷方余额40000元,其中:“应付甲公司账款”明细科目贷方余额45000元,“应付乙公司账款”明细科目借方余额5000元,“预付账款”科目月末贷方余额30000元,其中:“预付A工厂账款”明细科目贷方余额50000元,“预付B工厂账款”明细科目借方余额20000元。该企业月末资产负债表中“应付账款”项目的金额为___元。
A. 90000
B. 45000
C. 95000
D. 70000
【单选题】
以下不应在“存货”项目下列示的是___。
A. 材料采购
B. 发出商品
C. 工程物资
D. 生产成本
【单选题】
某企业2016年6月l日从银行借入期限为5年的借款800万元,编制2018年12月31日资产负债表时,此项借款应填入的报表项目是___。
A. 短期借款
B. 长期借款
C. 一年内到期的非流动负债
D. 其他长期负债
【单选题】
资产负债表中“未分配利润”项目应根据___填列。
A. “未分配利润”科目余额
B. “本年利润”科目余额
C. “利润分配”科目余额
D. “本年利润”科目和“利润分配”科目余额
【单选题】
下列资产负债表项目,不能根据总账科目和明细账科目余额分析计算填列的有___。
A. 长期借款
B. 短期借款
C. 应付债券
D. 长期待摊费用
【单选题】
年度资产负债表日是指每年的___。
A. 12月31日
B. 3月31日
C. 6月30日
D. 9月31日
【单选题】
某企业2018年12月31日“固定资产”账户余额为1000万元,“累计折旧”账户余额为300万元,“固定资产减值准备”账户余额为100万元。该企业2018年12月31日资产负债表中固定资产项目的填列金额为___万元。
A. 1000
B. 900
C. 700
D. 600
【单选题】
某企业2018年12月31日“无形资产”账户余额为500万元,“累计摊销”账户余额为200万元,“无形资产减值准备”账户余额为100万元。该企业2018年12月31日资产负债表中无形资产项目的填列金额为___万元。
A. 500
B. 300
C. 400
D. 200
【单选题】
资产负债表中,直接根据总账科目余额填列的项目是___。
A. 货币资金
B. 应付账款
C. 长期借款
D. 盈余公积
【单选题】
乙企业期末“原材料”科目的借方余额300万元,“生产成本”科目的借方余额200万元,“库存商品”科目的借方余额500万元,“存货跌价准备”科目的贷方余额80万元,该企业期末资产负债表中“存货”项目应填列的金额为___万元。
A. 1000
B. 920
C. 800
D. 720
【单选题】
某企业“应收账款”有两个明细账户:“应收账款—甲企业”,其期末余额在借方,为30000元,“应收账款—乙企业”,其期末余额在贷方,为8000元。“预收账款”有一个明细账户,其期末余额在贷方,为6000元。则资产负债表中“预收账款”项目填列的金为___。
A. 14000元
B. 30000元
C. 6000元
D. 38000元
【单选题】
企业“长期借款”账户的期末贷方余额为800 000元,其中2016年6月借入的三年期借款,500 000元,其余为2017年年末借入的三年期借款。“应付债券”的贷方余额为600 000元,均为2017年初发行,其中三年期的有200000元,其余为五年期企业债券。假设企业没有其他长期负债,在编制企业2018年度的资产负债表时,“一年内到期的非流动负债”项目填列的金额为___元。
A. 700000
B. 500000
C. 1400000
D. 1100000
【单选题】
一年内到期的非流动资产可以据以下哪个科目明细账分析计算填列___。
A. 持有至到期投资
B. 固定资产
C. 无形资产
D. 长期股权投资
【单选题】
一年内到期的非流动负债不需要根据哪个科目明细账分析计算填列___。
A. 递延所得税负债
B. 长期借款
C. 长期应付款
D. 应付债券
【单选题】
资产负债表期初余额填列方法的是___。
A. 根据本期账户发生额填列
B. 根据上年本表的期初余额填列
C. 根据上年本表的期末余额填列
D. 根据本期报表的期末余额填列
【单选题】
资产负债表长期负债各项目金额填列方法正确的是___。
A. 有关总账科目余额减一年内到期的非流动负债扣除数
B. 有关总账科目本期贷方发生额
C. 有关总账科目本期借方发生额
D. 有关总账科目期初余额
【单选题】
资产负债表是指反映企业在___财务状况的会计报表。
A. 某一特定时期
B. 某一特定日期
C. 某一会计期间
D. 某一会计时期
【单选题】
资产负债表固定资产项目说法正确的是___。
A. 固定资产原值
B. 固定资产净值
C. 固定资产净额
D. 固定资产现值
【单选题】
下列不是根据总账科目所属明细账余额计算填列的是___。
A. 应付账款
B. 预付账款
C. 应收账款
D. 应收票据
【单选题】
下列资产负债表内勾稽关系表述不正确的是___。
A. 流动资产+非流动资产=资产总额
B. 资产总额=负债总额
C. 流动负债+非流动负债=负债总额
D. 资产总额=权益总额
【单选题】
“应收账款”科目明细账中若有贷方余额,应将其计入资产负债表中的___项目。
A. 应收账款
B. 预收账款
C. 应付账款
D. 预付款项
【单选题】
以下不应在“存货”项目下列示的是___。
A. 材料采购
B. 材料成本差异
C. 在建工程
D. 生产成本
【单选题】
下列资产负债表项目,应根据多个总账科目余额填列的有___。
A. 实收资本
B. 未分配利润
C. 短期借款
D. 应付职工薪酬
【单选题】
甲企业期末“原材料”科目的借方余额400万元,“生产成本”科目的借方余额300万元,“库存商品”科目的借方余额500万元, “存货跌价准备”科目的贷方余额100万元,该企业期末资产负债表中“存货”项目应填列的金额为___万元。
A. 1000
B. 900
C. 1100
D. 1300
【单选题】
我国资产负债表的格式是___。
A. 单步式
B. 多步式
C. 账户式
D. 报告式
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用