刷题
导入试题
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
推荐试题
【单选题】
成本推动型通货膨胀产生的主要原因是___
A. 总需求超出了社会潜在产出
B. 生产要素价格上涨导致的生产成本上涨
C. 总需求和总供给两个方面因素的共同作用
D. 经济结构方面的因素的变动
【单选题】
混合型通货膨胀产生的主要原因是___
A. 总需求超出了社会潜在产出
B. 生产要素价格上涨导致的生产成本上涨
C. 总需求和总供给两个方面因素的共同作用
D. 经济结构方面的因素的变动
【单选题】
结构型通货膨胀产生的主要原因是___
A. 总需求超出了社会潜在产出
B. 生产要素价格上涨导致的生产成本上涨
C. 总需求和总供给两个方面因素的共同作用
D. 经济结构方面的因素的变动
【单选题】
关于通货膨胀与经济增长的关系上,持促进论观点的主要是___
A. 凯恩斯主义经济理论
B. 坎普斯、哈伯格、蒙代尔等
C. 帕廷金
D. 亚当斯密
【单选题】
关于通货膨胀与经济增长的关系上,持中性论观点的主要是___
A. 凯恩斯主义经济理论
B. 坎普斯、哈伯格、蒙代尔等
C. 帕廷金
D. 亚当斯密
【单选题】
最早研究通货膨胀和失业两者关系的学者是___
A. 萨缪尔森
B. 凯恩斯
C. 弗里德曼
D. 菲利普斯
【单选题】
在通货膨胀时期,下列哪种人一般会是受益者___
A. 工人
B. 存款人
C. 债务人
D. 债权人
【单选题】
为抑制或治理成本推动型通货膨胀而采取的政策与措施不包括___
A. 财政政策
B. 货币政策
C. 需求政策
D. 收入政策
【单选题】
费雪对通货紧缩的解释为___
A. 有效需求不足
B. 企业过度负债
C. 流动性陷阱下的总需求不足(克鲁格曼)
D. 货币量外生性的减少
【单选题】
弗里德曼对通货紧缩的解释为___
A. 有效需求不足
B. 企业过度负债
C. 流动性陷阱下的总需求不足
D. 货币量外生性的减少
【单选题】
凯恩斯对通货紧缩的解释为___
A. 有效需求不足
B. 企业过度负债
C. 流动性陷阱下的总需求不足
D. 货币量外生性的减少
【单选题】
金融稳定是一个宏观概念,它要求金融体系的三个组成部分___,健康运转,并且能够正确评估、防范和化解金融风险
A. 金融机构、金融市场和金融监管
B. 金融机构、金融监管和金融基础设施
C. 金融机构、金融市场和金融基础设施
D. 金融监管、金融市场和金融基础设施
【多选题】
对于“均衡”这一概念的界定,经济学家的理解主要有哪几种___
A. 瓦尔拉斯的一般均衡理论
B. 马歇尔的局部均衡理论
C. 凯恩斯的非充分就业的均衡理论
D. 纳什的博弈均衡理论
E. 科尔内的短缺均衡理论
【多选题】
理论中,对货币均衡的解释主要有___
A. 货币供给与货币需求相等
B. 货币利率与自然利率相等
C. 消费与投资相等
D. 储蓄与投资相等
E. M(s)=M(d)
【多选题】
下列关于总供求曲线的描述,哪些是正确的___
A. 当经济未达到充分就业时,总供给曲线是一条向右上方倾斜的曲线
B. 当经济未达到充分就业时,总需求曲线是一条向右下方倾斜的曲线
C. 当经济达到充分就业时,总供给曲线是一条垂直于横轴的直线
D. 当经济达到充分就业时,总需求曲线是一条垂直于横轴的直线
E. 总需求曲线是一条向右下方倾斜的曲线
【多选题】
社会总供求平衡的主要表现为___
A. 是货币形态的均衡
B. 是实物形态的均衡
C. 是允许短期偏离的动态均衡
D. 是现代经济运行中的市场总体均衡
E. 是商品市场和货币市场均衡的统一
【多选题】
货币供求与社会总供求的内在联系与区别主要有___
A. 社会商品供给规模对货币需求有制约
B. 社会商品生产周期对货币需求有影响
C. 调节货币供给量的规模能影响社会总需求的扩展
D. 社会总供给所提出的货币需求不是货币需求的全部
E. 货币供给量变动与社会总需求量变动在时间上不一致
【多选题】
目前,被各国广泛使用的价格指数主要有___
A. PPI
B. OPI
C. CPI
D. GNP
E. GDP Deflator
【多选题】
根据物价上涨的方式,可以将通货膨胀分为___
A. 爬行通货膨胀
B. 公开性通货膨胀
C. 温和通货膨胀
D. 恶性通货膨胀
E. 隐蔽性通货膨胀模式
【多选题】
通货膨胀的治理方法包括___
A. 紧缩政策
B. 货币贬值
C. 收入政策
D. 供给政策
E. 指数化政策
【多选题】
通货紧缩的影响主要有___
A. 人们的购买力增加,促使人们更多的储蓄而更少的支出
B. 等于对财富总额打了一个折扣,减少社会总财富
C. 收入从消费倾向高的低收入者向消费倾向低的高收入者转移
D. 扩大社会总需求,带动总供给增加,从而促进经济增长
E. 降低企业投资的积极性,增加失业率
【多选题】
完善的金融预警系统应由下列哪些部分组成___
A. 预警目标
B. 预警指标
C. 预警方法
D. 预警框架
E. 预警区间
【单选题】
狭义的马克思主义是指: ___
A. 马克思恩格斯创立的基本理论基本观点和学说的体系
B. 列宁主义
C. 毛泽东思想
D. 邓小平理论
【单选题】
马克思主义产生的客观条件是: ___
A. 无产阶级作为独立的政治力量登上历史舞台
B. 马克思恩格斯完成了世界观和阶级立场的转变
C. 马克思恩格斯汲取了人类文明的优秀成果
D. 资本主义社会的相当发展和基本矛盾的显现
【单选题】
第一次工业革命的内容是: ___
A. 机器大工业取代工场手工业
B. 提高社会劳动生产率
C. 促进资本主义社会生产力的发展
D. 推动资本主义进入新的阶段
【单选题】
在马克思恩格斯创立的理论体系中,被列宁称为“科学思想中的最大成果”的是: ___
A. 马克思主义哲学
B. 马克思主义政治经济学
C. 科学社会主义
D. 剩余价值学说
【单选题】
早期无产阶级反对资产阶级的斗争具有自发性,导致这种自发性的根本原因是___
A. 人工捣毁机器烧毁厂房
B. 工人要求改善工作条件提高待遇
C. 资本家剥削压迫工人日益深重和残酷
D. 缺乏科学理论和无产阶级政党的领导
【单选题】
马克思主义哲学吸取的黑格尔哲学中的“合理内核”是: ___
A. 唯物主义思想
B. 辩证法思想
C. 可知论思想
D. 认识论思想
【单选题】
马克思主义哲学吸取的费尔马哈哲学中的“基本内核”是: ___
A. 唯物主义思想
B. 辩证法思想
C. 可知论思想
D. 认识论思想
【单选题】
马克思从资产阶级古典政治经济学家那里继承的最重要的思想是: ___
A. 劳动价值论
B. 剩余价值学说
C. 唯物论
D. 辩证法
【单选题】
马克思主义最根本的世界观和方法论是: ___
A. 辩证唯物主义与历史唯物主义
B. 唯物主义和辩证法
C. 剩余价值学说和劳动价值论
D. 科学社会主义
【单选题】
马克思主义最重要的理论品质是: ___
A. 辩证唯物主义与历史唯物主义
B. 实现共产主义社会
C. 致力于实现以劳动人民为主体的最广大人民的根本利益
D. 坚持一切从实际出发,理论联系实际,实事求是,在实践中检验和发展真理
【单选题】
马克思主义最崇高的社会理想是 ___
A. 推翻资本主义社会
B. 实现共产主义社会
C. 建立生产资料公有制
D. 建立无产阶级专政
【单选题】
马克思主义最鲜明的政治立场是: ___
A. 实现无产阶级政党执政
B. 于实现共产主义社会制度
C. 推翻资本主义社会
D. 致力于实现最广大人民的根本利益
【单选题】
马克思主义生命力的根源在于: ___
A. 唯物论与辩证法的统一
B. 科学性与阶级性的统一
C. 以实践为基础的科学性与革命性的统一
D. 以唯物史观和剩余价值学说为基础
【单选题】
在哲学史上第一次科学地对哲学基本问题作出完整概括和论证的是:___
A. 黑格尔
B. 费尔巴哈
C. 马克思
D. 恩格斯
【单选题】
哲学基本问题是: ___
A. 人与周围世界的基本联系问题
B. 思维和存在的问题
C. 思维和存在的关系问题
D. 人的本质问题
【单选题】
划分唯物主义和唯心主义的标准是: ___
A. 是否承认世界的统一性
B. 物质与意识何者为第一性的问题
C. 物质与意识是否具有同一性的问题
D. 世界是联系发展的还是孤立静止的
【单选题】
一切唯心主义都主张: ___
A. 精神是世界的本原
B. 世界是“绝对精神”的外化
C. 思维依赖于存在
D. 存在就是被感知
【单选题】
对哲学基本问题第二个方面即思维能否认识或正确认识存在、或者世界是否可知的问题作不同回答,哲学上划分为: ___
A. 唯物主义和唯心主义
B. 反映论和先验论
C. 可知论和不可知论
D. 唯物史观和唯心史观
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用