刷题
导入试题
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
推荐试题
【单选题】
铁路局_______向铁道部上报客车配属统计情况。___
A. 每月
B. 每季
C. 每半年
D. 每年
【单选题】
客车报废自核准之日起取消配属,并在_______内解体完毕。___
A. 1个月
B. 2个月
C. 3个月
D. 6个月
【单选题】
运用列车质量鉴定时,列车等级分四档,B级列车为_______。___
A. 800~899分
B. 900~1000分
C. 700~799分
D. 600~699分
【单选题】
铁路局管内运行的旅客列车可按走行公里确定入库检修周期,原则上运行_______须入库检修一次。___
A. 2000km
B. 3000km
C. 4000km
D. 5000km
【单选题】
运行到华东、华中、华南、西南的客车,每年在_______前,完成客车电扇和独立供电空调客车的安装调试工作。___
A. 4月1日
B. 5月1日
C. 6月1日
D. 7月1日
【单选题】
车辆段应设质量检查机构,质量检查机构应_______对全面运用列车进行质量检查和鉴定。___
A. 每月
B. 每季
C. 每半年
D. 每年
【单选题】
鉴定列车在_______内发生险性及以上责任行车事故的,取消鉴定评比资格。___
A. 月
B. 季
C. 半年
D. 一年
【单选题】
_______是运用客车维修与保养的主体,承担着客车入库检修、辅修、A1修和客车整修等工作。___
A. 库列检
B. 客列检
C. 车辆包乘组
D. 质量检查组
【单选题】
属客列检不摘车修范围的故障,未做处理或摘车处理为_______责任。___
A. 库列检
B. 客列检
C. 车辆包乘组
D. 质量检查组
【单选题】
无客列检作业时,车端电气连接线的摘解,由_______负责。___
A. 客列检人员
B. 机车乘务组
C. 车辆乘务员
D. 调车人员
【单选题】
旅客列车运行途中甩挂车辆时,车辆的摘挂、软管的摘解,由_______负责。___
A. 客列检人员
B. 机车乘务组
C. 车辆乘务员
D. 调车人员
【单选题】
电气装置与轨面距离运用限度规定不小于_______。___
A. 80mm
B. 100mm
C. 120mm
D. 150mm
【单选题】
发生双管供风设备故障或用单管供风机车救援接续牵引时,_______根据命令将编组客车风管路改为单管供风状态。___
A. 客列检人员
B. 机车乘务组
C. 车辆乘务员
D. 调车人员
【单选题】
运用列车每月应定期排除列车首尾各_______客车风缸内的积水。___
A. 1辆
B. ]2辆
C. 3辆
D. 4辆
【单选题】
车间干部应_______检查《旅客列车技术状态交接簿》[车统—181]情况并签字。___
A. 每天
B. 每星期
C. 每月
D. 每季
【单选题】
运用列车质量鉴定时,列车等级分四档,D级列车为_______。___
A. 800~899分
B. 900~1000分
C. 700~799分
D. 600~699分
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第4脚是_______。___
A. 10V电源端
B. 载波信号的输入输出端
C. 5V电源端
D. 复位输出
【单选题】
造成_______为重大事故。___
A. 30人以上死亡
B. 10人以上30人以下死亡
C. 3人以上10人以下死亡
D. 3人死亡
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第5脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 接收发送数据选择端
D. 看门狗输入端
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第6脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 接收发送数据选择端
D. 看门狗输入端
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第8脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 接收发送数据选择端
D. 看门狗输入端
【单选题】
造成_______为较大事故。___
A. 1亿元以上的直接经济损失
B. 5000万以上1亿元以下的直接经济损失
C. 1000万元以上5000万以下的直接经济损失
D. 500万元以上1000万以下的直接经济损失
【单选题】
_______为特别重大事故。___
A. 繁忙干线客运列车脱轨18辆以上并中断铁路行车48h以上
B. 客运列车脱轨2辆以上18辆以下并中断繁忙干线铁路行车24h以上或者中断其他铁路行车48h以上
C. 客运列车脱轨2辆以上18辆以下
D. 客运列车脱轨2辆以上
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第9脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 接收发送数据选择端
D. 看门狗输入端
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第10脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 振荡器输出端
D. 电源接地端
【单选题】
SWKPAS20R防滑器系统的速度传感器与齿轮顶径向间隙为_______。___
A. 1.0mm±0.2mm
B. 1.0mm±0.5mm
C. 1.5mm±0.2mm
D. 1.5mm±0.5mm
【单选题】
KZS/M-Ⅰ型轴报器中调制解调器的第11脚是_______。___
A. 串行数据接收端
B. 串行数据发送端
C. 振荡器输出端
D. 电源接地端
【单选题】
TFX1型防滑器进行压力开关试验,当压力为_______时,压力开关接通。___
A. 180~210kPa
B. 180~250kPa
C. 140~210kPa
D. 120~250kPa
【单选题】
TFX1型防滑器进行压力开关试验,当压力为_______时,压力开关关断。___
A. 150~180kPa
B. 150~250kPa
C. 120~210kPa
D. 120~250kPa
【单选题】
25T型客车检修规程规定:真空集便器必须清理过滤调压阀滤芯,MONOGRAM过滤调压阀压力值应为_______。___
A. 100kPa
B. 300kPa
C. 500kPa
D. 700kPa
【单选题】
25T型客车检修规程规定:真空集便器必须清理过滤调压阀滤芯,EVAC过滤调压阀压力值应为_______。___
A. 150kPa
B. 250kPa
C. 350kPa
D. 450kPa
【单选题】
25T型客车检修规程规定:轴温报警器轴温显示正常,同侧误差小于_______。[1.0分]___
A. 1℃
B. 2℃
C. 3℃
D. 5℃
【单选题】
25T型客车检修规程对于LDK•2型电磁阀常闭位密封及排气的试验要求,调整电压至95V,转换开关至得电位、电磁阀开关至失电位,充风至定压,待压力稳定后观察压力表,1min表降不大于_______。___
A. 10kPa
B. 20kPa
C. 30kPa
D. 40kPa
【单选题】
25T型客车检修规程对于LDK•2型电磁阀常闭位密封及排气的试验要求,调整电压至95V,转换开关至得电位、电磁阀开关至得电位,充风至定压,待压力稳定后观察压力表,表压从600kPa降至_______的时间不大于12s。___
A. 10kPa
B. 20kPa
C. 30kPa
D. 40kPa
【单选题】
甲类功率放大器的静态工作点应设于_______。___
A. 直流负载线的下端
B. 交流负载线的中心
C. 直流负载线的中点
D. 直流负载线的上端
【单选题】
用于把矩形波脉冲变为尖脉冲的电路是__________
A. RC耦合电路
B. 微分电路
C. 积分电路
D. 稳压电路
【单选题】
TFX1型防滑器故障代码为1.1表示_______电磁铁故障。___
A. 第一轴充风
B. 第一轴排风
C. 第二轴充风
D. 第二轴排风
【单选题】
TFX1型防滑器故障代码为2.0表示_______电磁铁故障。___
A. 第一轴充风
B. 第一轴排风
C. 第二轴充风
D. 第二轴排风
【单选题】
TFX1型防滑器主机电源由直流48V提供,设有极性保护,瞬态干扰滤波网络及自动通断环节,在车电_______电压变化范围内,本系统能稳定可靠的工作。___
A. 42~64V
B. 48~80V
C. 32~64V
D. 32~80V
【单选题】
TFX1型防滑器当电源接通后,主机立即对系统进行自诊断,诊断过程中若遇到列车起动,当速度高于_______时,主机自动停止“诊断”而转入防滑主程序。___
A. 1km/h
B. 1.5km/h
C. 2km/h
D. 3km/h
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用