刷题
导入试题
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
推荐试题
【判断题】
中华人民共和国允许外国的企业和其他经济组织或者个人依照中华人民共和国法律的规定在中国投资,同中国的企业或者其他经济组织进行各种形式的经济合作。
A. 对
B. 错
【判断题】
我国《宪法》明确规定,国家推广全国通用的普通话。
A. 对
B. 错
【判断题】
中华人民共和国对于因为政治原因要求避难的外国人,可以给予受庇护的权利。
A. 对
B. 错
【判断题】
国家组织和鼓励植树造林,保护林木。
A. 对
B. 错
【判断题】
国有企业依照法律规定,通过职工代表大会和其他形式,实行民主管理。
A. 对
B. 错
【判断题】
我国《宪法》明确规定,集体经济组织实行民主管理,依照法律规定选举和罢免管理人员,决定经营管理的重大问题。
A. 对
B. 错
【判断题】
国家加强经济立法,完善微观调控。
A. 对
B. 错
【判断题】
我国对非公有制经济依法实行监督和管理。
A. 对
B. 错
【判断题】
土地的所有权可以依照法律的规定转让。
A. 对
B. 错
【判断题】
城镇中的手工业、工业、建筑业、运输业、商业、服务业等行业的各种形式的合作经济,都是社会主义劳动群众集体所有制经济。
A. 对
B. 错
【判断题】
国家维护社会主义法制的统一和尊严。
A. 对
B. 错
【判断题】
我国《宪法》明确规定,各民族都有使用和发展自己的语言文字的自由,都有保持或者改革自己的风俗习惯的自由。
A. 对
B. 错
【判断题】
禁止对任何民族的歧视和压迫,禁止破坏民族团结和制造民族分裂的行为。
A. 对
B. 错
【判断题】
各民族自治地方都是中华人民共和国不可分离的部分。
A. 对
B. 错
【判断题】
宅基地、自留地、自留山属于公民个人所有。
A. 对
B. 错
【判断题】
自治县是民族自治地方。
A. 对
B. 错
【判断题】
根据《宪法》对于中华人民共和国的行政区域划分的规定,自治州分为县、自治县、市。
A. 对
B. 错
【判断题】
中华人民共和国主席缺位的时候,由副主席继任主席的职位。
A. 对
B. 错
【判断题】
中华人民共和国主席、副主席都由全国人民代表大会选举。
A. 对
B. 错
【判断题】
我国《宪法》明确规定,全国人民代表大会和全国人民代表大会常务委员会认为必要的时候,可以组织关于特定问题的调查委员会,调查委员会进行调查的时候,一切有关的国家机关、社会团体和公民都有义务向它提供必要的材料。因此本题说法正确。
A. 对
B. 错
【判断题】
外事委员会属于专门委员会。
A. 对
B. 错
【判断题】
全国人民代表大会举行会议的时候,选举主席团主持会议。
A. 对
B. 错
【判断题】
民族自治地方的自治机关没有管理地方财政的自治权。
A. 对
B. 错
【判断题】
民族自治地方的自治机关可以不经过批准组织本地方维护社会治安的公安部队。
A. 对
B. 错
【判断题】
凡是依照国家财政体制属于民族自治地方的财政收入,都应当由民族自治地方的自治机关自主地安排使用。
A. 对
B. 错
【判断题】
自治州的人民代表大会常务委员会中应当有实行区域自治的民族的公民担任主任或者副主任。
A. 对
B. 错
【判断题】
民族自治地方的人民代表大会有权依照当地民族的政治、经济和文化的特点,制定自治条例和单行条例。
A. 对
B. 错
【判断题】
国家在民族自治地方开发资源、建设企业的时候,应当照顾民族自治地方的利益。
A. 对
B. 错
【判断题】
地方各级人民政府实行省长、市长、县长、区长、乡长、镇长负责制。
A. 对
B. 错
【判断题】
地方各级人民政府每届任期同本级人民代表大会每届任期相同。
A. 对
B. 错
【判断题】
根据《宪法》的规定,省人民政府不能决定乡的建置和区域划分。
A. 对
B. 错
【判断题】
民族乡的人民代表大会可以依照法律规定的权限采取适合民族特点的具体措施。
A. 对
B. 错
【判断题】
地方各级人民代表大会代表名额和代表产生办法由党内法规规定。
A. 对
B. 错
【判断题】
中央军事委员会实行主席负责制。
A. 对
B. 错
【判断题】
县级以上的地方各级人民代表大会设立常务委员会。
A. 对
B. 错
【判断题】
任何组织或者个人不得侵占、买卖或者以其他形式非法转让土地。
A. 对
B. 错
【判断题】
中华人民共和国保护在中国境内的外国人的合法权利和利益,在中国境内的外国人必须遵守中华人民共和国的法律。
A. 对
B. 错
【判断题】
国家加强武装力量的革命化、现代化、正规化的建设,增强国防力量。
A. 对
B. 错
【判断题】
根据《宪法》对于中华人民共和国的行政区域划分的规定,省、自治区分为自治州、县、自治县、市。
A. 对
B. 错
【判断题】
《宪法》明确规定,我国实行工作人员的培训和考核制度,不断提高工作质量和工作效率,反对官僚主义。
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用