刷题
导入试题
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
推荐试题
【判断题】
严格党的组织生活制度,民主生活会应当经常化,遇到重要或者普遍性问题应当及时召开。
A. 对
B. 错
【判断题】
发现领导干部有思想、作风、纪律等方面苗头性、倾向性问题的,有关党组织负责人应当及时对其谈话提醒。
A. 对
B. 错
【判断题】
派出机关应当加强对派驻纪检组工作的领导,定期约谈被监督单位党组织主要负责人、派驻纪检组组长,督促其落实管党治党责任。
A. 对
B. 错
【判断题】
各级党组织应当支持民主党派履行监督职能,重视民主党派和无党派人士提出的意见、批评、建议,完善知情、沟通、反馈、落实等机制。
A. 对
B. 错
【判断题】
对于上级党组织交办以及巡视等移交的违纪问题线索,应当及时处理,并在5个月内反馈办理情况。
A. 对
B. 错
【判断题】
党组织主要负责人个人有关事项应当面向社会公开,主动接受监督。
A. 对
B. 错
【判断题】
党内监督的重点对象是党的领导机关和领导干部特别是主要领导干部。
A. 对
B. 错
【判断题】
党内监督必须把法律挺在前面。
A. 对
B. 错
【判断题】
对反映本机关主要负责人的检举控告,直接将原件附函报送上级信访举报部门。
A. 对
B. 错
【判断题】
利用职权或者职务上的影响操办婚丧喜庆事宜,在社会上造成不良影响的,给予警告或严重警告处分。
A. 对
B. 错
【判断题】
对失职失责性质恶劣、后果严重的,不论其责任人是否调离转岗、提拔或者退休,实行终身问责。
A. 对
B. 错
【判断题】
问责决定作出后,应当及时向被问责党组织或者党的领导干部宣布并督促执行。
A. 对
B. 错
【判断题】
中共十九大报告首次提出“两个一百年”奋斗目标。
A. 对
B. 错
【判断题】
对党组织的问责方式一般应单独使用,对党组织和党员领导干部进行问责时,可以合并使用。
A. 对
B. 错
【判断题】
巡视组依靠被巡视党组织开展工作,不干预被巡视地区(单位)的正常工作,不履行执纪审查的职责。
A. 对
B. 错
【判断题】
党员、干部个人向从事公务的人员等赠送超出正常礼尚往来的礼金,违反的是廉洁纪律,不属于违反中央八项规定精神问题。
A. 对
B. 错
【判断题】
查明涉嫌违纪或者职务违法、职务犯罪问题后,审查调查组应当撰写事实材料,但不得与被审查调查人见面。
A. 对
B. 错
【判断题】
审查调查人员不得参与案件审理。
A. 对
B. 错
【判断题】
依法被留置的被调查人如果在逃,监察机关可以发布通缉令追捕归案。
A. 对
B. 错
【判断题】
一人有两种以上(含两种)应当受到党纪处分的违纪行为,应当合并处理,按其数种违纪行为中应当受到的最高处分给予处分。
A. 对
B. 错
【判断题】
监察机关经调查,对涉嫌犯罪取得的财物,依法予以没收、追缴或者责令退赔;对涉嫌违法取得的财物,应当随案移送人民检察院。
A. 对
B. 错
【判断题】
《中国共产党廉洁自律准则》坚持依规治党与从严治党相结合,紧扣廉洁自律主题。
A. 对
B. 错
【判断题】
《监察法》明确了6类监察对象,其中包括基层群众性自治组织中从事管理的人员和其他依法履行公职的人员。
A. 对
B. 错
【判断题】
各省、自治区、直辖市及计划单列市党委可以根据《中国共产党纪律处分条例》,结合各自工作的实际情况,制定单项实施规定。
A. 对
B. 错
【判断题】
《中国共产党纪律处分条例》适用的对象是所有党组织和全体党员。
A. 对
B. 错
【判断题】
监察机关应当建立健全处分执行公示、回访教育、情况报告和专项检查等制度。
A. 对
B. 错
【判断题】
中国共产党的党徽党旗是中国共产党的象征和标志。党的各级组织和每一个党员都要维护党徽党旗的尊严。要按照规定制作和使用党徽党旗。
A. 对
B. 错
【判断题】
中国共产党全体党员和各级党员领导干部必须坚定共产主义理想和中国特色社会主义信念,必须坚持全心全意为人民服务根本宗旨。
A. 对
B. 错
【判断题】
党员领导干部违反规定组织、参加老乡会、校友会、战友会等,情节严重的,给予警告、严重警告或者撤销党内职务处分。
A. 对
B. 错
【判断题】
纪律检查机关必须把维护党的政治纪律和政治规矩放在首位,坚持纠正和查处上有政策、下有对策,有令不行、有禁不止,口是心非、阳奉阴违,搞团团伙伙、拉帮结派,欺骗组织、对抗组织等行为。
A. 对
B. 错
【判断题】
实行终身问责,对失职失责性质恶劣、后果严重的,不论其责任是否调离、提拔,都应当严肃问责。
A. 对
B. 错
【判断题】
巡视进驻、反馈、整改等情况,应当以适当方式公开,接受党员、干部和人民群众监督。
A. 对
B. 错
【判断题】
国家监察委员会主任和地方各级监察委员会主任连续任职不得超过两届。
A. 对
B. 错
【判断题】
被指定的纪委监委在纪委常委会会议审议通过后,将处理意见报请上级纪委监委同意后,由上级纪委监委将处理意见书面通知有处分权的纪委监委落实处理意见的,有处分权的纪委监委在履行处分程序时不需要进行审理,可以直接提请其常委会会议审议后按程序作出处分决定。
A. 对
B. 错
【判断题】
伟大斗争,伟大工程,伟大事业,伟大梦想,紧密联系、相互贯通、相互作用,其中起决定性作用的是党的建设新的伟大工程。
A. 对
B. 错
【判断题】
要建立不忘初心、牢记使命的制度,完善坚定维护党中央权威和集中统一领导的各项制度,健全党的全面领导制度,健全为人民执政、靠人民执政各项制度,健全提高党的执政能力和领导水平制度,完善全面从严治党制度。
A. 对
B. 错
【判断题】
破除潜规则,根本之策是强化明规则,以正压邪,让潜规则在党内以及社会上失去土壤、失去通道、失去市场。全党上下,任何一级组织、任何一名党员和干部都要严格遵守党的组织制度和党的法规纪律,对党忠诚,光明磊落,公道正派。
A. 对
B. 错
【判断题】
突出强调坚持党要管党、从严治党,不断提高党的领导水平和执政水平、提高拒腐防变和抵御风险能力,增强自我净化、自我完善、自我革新、自我提高能力,确保党始终成为中国特色社会主义事业的坚强领导核心。党风廉政建设和反腐败斗争,是党的建设的重大任务。
A. 对
B. 错
【判断题】
监察机关在调查涉嫌职务违法和职务犯罪案件过程中,发现被调查人还涉嫌公安机关、检察机关等机关管辖的违法犯罪,一般应当由监察机关为主调查,其他机关予以协助。
A. 对
B. 错
【判断题】
设区的市级以下监委采取留置措施,应当报上一级监委备案。
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用