刷题
导入试题
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
推荐试题
【单选题】
光合环式氨基酸所需的赤藓糖来自___
A. HMP途径
B. EMP途径
C. TCA途径
D. ED途径
【单选题】
合成氨基酸的重要前体α-酮戊二酸来自___
A. HMP途径
B. EMP途径
C. TCA途径
D. ED途径
【单选题】
反硝化细菌进行无氧呼吸产能时,电子传递的最终受体是___
A. 无机化合物中的氧
B. 氧气
C. 中间产物
D. 氢
【单选题】
以下能通过光合磷酸化产生NADPH2的微生物是___
A. 念珠藻
B. 鱼腥草
C. A和B
D. A和B均不是
【单选题】
在分支代谢途径中,每一分支途径的末端产物按一定百分率单独抑制共同途径中第一个酶的反馈抑制作用,称为___
A. 协同反馈抑制
B. 合作反馈抑制
C. 累积反馈抑制
D. 顺序反馈抑制
【单选题】
当分支代谢途径中的两种末端产物同时存在时,可以起着比一种末端产物大得多的反馈抑制作用是___
A. 协同反馈抑制
B. 合作反馈抑制
C. 累积反馈抑制
D. 顺序反馈抑制
【单选题】
将生物氧化区分为呼吸、无氧呼吸和发酵3种类型的依据是___
A. 受氢体性质的不同
B. 供氢气性质的不同
C. 电子受体不同
D. 电子供体不同
【单选题】
无氧条件下,EMP途径的终产物可能是___
A. 乳酸
B. 乙醛
C. 乙醇
D. A、B和C
【单选题】
核苷酸在生物体内的作用,以下说法正确的是___
A. 只能合成核酸
B. 只能合成核酸和参与某些酶的组成
C. 只能参与某些酶的组成
D. 主要是合成核酸和参与某些酶的组成
【单选题】
核糖产生的途径是___
A. HMP途径
B. EMP途径
C. ED途径
D. WD途径
【单选题】
关于细胞的生长,以下说法错误的是___
A. 微生物的生长指单个细胞的生长
B. 微生物的生长指群体的生长
C. 细胞个体的生长是指同化作用大于异化作用,细胞原生质不断增加
D. 微生物的生长是与外界环境因素共同作用的结果
【单选题】
代时为0.5h的细菌由103个增加到109个时需要多长时间?___
A. 40h
B. 20h
C. 10h
D. 3h
【单选题】
测定空气、水等大体积的样品中细胞数量常用的方法是___
A. 比浊法
B. 显微镜直接计数
C. 滤膜测数法
D. 平板菌落记数
【单选题】
对生活的微生物进行计数的最准确的方法是___。
A. 比浊法
B. 显微镜直接计数
C. 干细胞重量测定
D. 平板菌落记数
【单选题】
如果将处于对数期的细菌移至相同组分的新鲜培养基中,该批培养物将处于哪个生长期?___
A. 死亡期
B. 稳定期
C. 延迟期
D. 对数期
【单选题】
细菌细胞进入稳定期是由于:①细胞已为快速生长作好了准备;②代谢产生的毒性物质发生了积累;③能源已耗尽;④细胞已衰老且衰老细胞停止分裂;⑤在重新开始生长前需要合成新的蛋白质___。
A. 1,4
B. 2,3
C. 2,4
D. 1,5
【单选题】
以下不属于分批培养延迟期过程的特征的是___
A. 细胞数目增加
B. 菌体个体变大,体积增加
C. 细胞内RNA含量增加
D. 代谢活跃
【单选题】
医学上采用革兰氏染色鉴定病原菌,应该采用___的菌体。
A. 延缓期
B. 对数期
C. 稳定期
D. 衰亡期
【单选题】
连续培养时培养物的生物量是由___来决定的。
A. 培养基中限制性底物的浓度
B. 培养罐中限制性底物的体积
C. 温度
D. 稀释率
【单选题】
使用高压蒸汽灭菌时,排放冷空气的原因是___
A. 有冷空气会使灭菌温度低于实际温度,影响灭菌效果
B. 有冷空气会使灭菌温度高于实际温度,破坏营养成分
C. 有冷空气会使造成灭菌锅爆炸
D. 以上均不是
【单选题】
干热灭菌和湿热灭菌作用力分别是___
A. 氧化作用和热蒸汽
B. 热空气和热蒸汽
C. 还原作用和压力
D. 氧化作用和压力
【单选题】
下列哪一种不属于微生物与氧气的关系划分的___。
A. 好氧微生物
B. 厌氧微生物
C. 兼性好氧微生物
D. 兼性厌氧微生物
【单选题】
下列关于氧化还原电位与微生物生长,说法错误的是___。
A. +0.3V以上适合好氧微生物的生长
B. +0.1V以下适合厌氧微生物的生长
C. 不同微生物对氧化还原电位的需求不一样
D. 兼性好氧微生物在+0.1V上进行发酵作用,在+0.1V以下进行有氧呼吸
【单选题】
福尔马林的成分是___。
A. 是30%的甲醛水溶液
B. 是40%的甲醛水溶液
C. 是30%的戊二醛水溶液
D. 是40%的戊二醛水溶液
【单选题】
关于消毒剂和防腐剂的作用机理,以下说法错误的是___。
A. 重金属类通过与蛋白质的巯基结合,导致蛋白变性
B. 低浓度的酚可以破坏细胞膜组分,高浓度的酚使菌体蛋白质凝固
C. 表面活性剂与细胞膜上的磷脂发生作用,造成孢内物质泄露,菌体死亡
D. 氧化剂破坏细胞壁的结构,导致菌体死亡
【单选题】
以下哪种抗生素不抑制蛋白质的合成___。
A. 氯霉素
B. 链霉素
C. 头孢菌素
D. 红霉素
【单选题】
___能通过抑制叶酸合成而抑制细菌生长。
A. 青霉素
B. 磺胺类药物
C. 四环素
D. 以上所有
【单选题】
关于常用灭菌、消毒等方法,以下说法错误的是___。
A. 灭菌是用物理和化学的方法杀灭所有的微生物
B. 消毒是用物理或者化学方法杀灭病所有的微生物
C. 防止或抑制微生物生长和繁殖的方法称为防腐或抑菌
D. 过滤除菌利用物理阻留的方法将液体或者空气中的细菌除去
【单选题】
光波杀菌最强的波长范围是___
A. 0.06-13.6 nm
B. 250-280 nm
C. 300-400 nm
D. 450-600 nm
【单选题】
杀灭所有微生物的方法称为___
A. 消毒
B. 灭菌
C. 防腐
D. 杀菌
【单选题】
测定空气中微生物数量常用的方法是___
A. 稀释平板法
B. 滤膜培养法
C. 稀释培养法
D. 稀释滤膜法
【单选题】
测定土壤中微生物的总数采用的方法是___
A. 血球计数板法
B. 涂片计数法
C. 比浊计数法
D. 以上均可以
【单选题】
各种中温型微生物生长的最适温度为___
A. 20-40℃
B. 25-37℃
C. 35-40℃
D. 15-30℃
【单选题】
升汞用于实验室非金属器皿表面消毒的浓度通常为___
A. 0.001%
B. 0.1%
C. 1%
D. 10%
【单选题】
链霉素抑菌机制是___
A. 破坏膜结构
B. 阻碍细胞壁的合成
C. 阻碍30S核糖体对蛋白质的合成
D. 阻碍DNA的合成
【单选题】
丝裂霉素的作用机制是___
A. 阻碍蛋白质的合成
B. 阻碍核酸的解链
C. 切断DNA链
D. 阻碍DNA的组装
【单选题】
碘酒的杀菌原理是___
A. 氧化还原变性
B. 脱水溶脂变性
C. 氧化脱水变性
D. 以上均是
【单选题】
杀灭沙门氏菌的最佳方法是___
A. 紫外线
B. 巴氏杀菌
C. 干热灭菌
D. 高压蒸汽灭菌
【单选题】
将细菌作为实验材料用于遗传学方面的研究优点是 ___。
A. 生长快速
B. 易得菌体
C. 代谢类型多
D. 所有以上特点
【单选题】
遗传型是指生物的 ___。
A. 蛋白质序列
B. 氨基酸序列
C. 核苷酸序列
D. 多肽序列
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用