刷题
导入试题
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
推荐试题
【判断题】
首套住房贷款利息的扣除标准是全国统一的。
A. 对
B. 错
【判断题】
婚后购买住房,经夫妻双方约定,纳税人发生的符合条件的住房贷款利息支出,住房贷款利息可以选择由其中一方扣除,或由双方分别按照50%扣除,具体扣除方式在一个纳税年度内不能变更。
A. 对
B. 错
【判断题】
纳税人享受赡养老人的专项附加扣除的计算时间分别为被赡养人年满60周岁的当月至赡养义务终止的次月。
A. 对
B. 错
【判断题】
纳税人赡养2个及以上老人的,不按老人人数加倍扣除。
A. 对
B. 错
【判断题】
纳税人享受子女教育专项附加扣除的,可以选择由其中一方按扣除标准的100%扣除,也可以选择由夫妻双方分别按照扣除标准的50%扣除。
A. 对
B. 错
【判断题】
在境外学校接受全日制学历教育的子女,其父母不可以享受子女教育专项附加扣除政策。
A. 对
B. 错
【判断题】
纳税人的子女年满3周岁但未上幼儿园,也能享受子女教育专项附加扣除政策。
A. 对
B. 错
【判断题】
个人接受本科(含)以下学历(学位)继续教育,符合本办法规定扣除条件的,可以选择由其父母扣除。
A. 对
B. 错
【判断题】
纳税人发生符合扣除条件的继续教育支出,可以由其配偶扣除。
A. 对
B. 错
【判断题】
纳税人接受学历(学位)继续教育的支出,无须留存相关资料。
A. 对
B. 错
【判断题】
在计算医药费用支出额度时,纳税人及其配偶、未成年子女发生的医疗费用支出不能混合,应按每个人分别计算。
A. 对
B. 错
【判断题】
纳税人发生的可计入大病医疗累计支出额的医药费用支出须在医保目录范围内。
A. 对
B. 错
【判断题】
纳税人发生符合条件的住房租金支出,允许按照全国统一额度扣除。
A. 对
B. 错
【判断题】
纳税人张某通过中介机构承租王某的住房,并签合同,张某符合住房租金扣除条件。考虑到张某配偶的工资收入较高,张某选择由其配偶扣除住房租金。这种做法正确。
A. 对
B. 错
【判断题】
纳税人王某和李某均符合住房租金扣除条件,其中王某在天津市区工作,李某在天津市下辖区县工作,王某的住房租金扣除金额高于李某。
A. 对
B. 错
【判断题】
纳税人取得经营所得,按月或按季计算应纳个人所得税,向经营管理所在地主管税务机关办理纳税申报。
A. 对
B. 错
【判断题】
纳税人从两处或两处以上取得经营所得的,选择其中一处经营管理所在地主管税务机关办理年度汇总申报。
A. 对
B. 错
【判断题】
居民个人取得综合所得且扣缴义务人未扣缴税款的,居民个人应当在取得所得的次年1月1日至3月31日内,向综合所得汇算清缴地主管税务机关办理纳税申报。
A. 对
B. 错
【判断题】
非居民个人取得特许权使用费所得且扣缴义务人未扣缴税款的,应当在取得所得的次年3月1日至6月30日内,向扣缴义务人主管税务机关办理纳税申报。
A. 对
B. 错
【判断题】
非居民个人取得工资薪金所得、劳务报酬所得且有两个以上扣缴义务人未扣缴税款的,非居民个人应分别向各扣缴义务人所在地税务机关办理纳税申报。
A. 对
B. 错
【判断题】
非居民个人取得工资薪金所得且扣缴义务人未扣缴税款的,如非居民个人在次年六月三十日前离境的,应当在离境前办理纳税申报。
A. 对
B. 错
【判断题】
居民个人因移居境外注销中国户籍的,应当在申请注销户籍后,向户籍所在地主管税务机关办理注销中国户籍纳税申报。
A. 对
B. 错
【判断题】
居民个人取得中国境外所得的,应当在取得所得的次年1月1日至1月31日内,向税务机关办理纳税申报。
A. 对
B. 错
【判断题】
居民个人取得中国境外所得,如在中国境内没有任职、受雇单位,并且户籍所在地与中国境内经常居住地不一致的,选择其中一地主管税务机关申报。
A. 对
B. 错
【判断题】
纳税人在注销户籍年度取得经营所得的,应当在申请注销户籍前,办理当年经营所得的汇算清缴。
A. 对
B. 错
【判断题】
技能人员职业资格继续教育、专业技术人员职业资格继续教育,享受专项附加扣除的时间为取得相关证书的次年。
A. 对
B. 错
【判断题】
享受住房租金专项附加扣除的时间为租赁合同(或协议)约定支付租金的次月至租赁行为终止的当月。
A. 对
B. 错
【判断题】
享受赡养老人专项附加扣除的时间为被赡养人年满60周岁的当月至赡养义务终止的当月。
A. 对
B. 错
【判断题】
扣缴义务人办理工资、薪金所得预扣预缴税款时,应当根据纳税人报送的《个人所得税专项附加扣除信息表》为纳税人办理专项附加扣除。
A. 对
B. 错
【判断题】
纳税人年度中间更换工作单位的,已经享受过的专项附加扣除,不得在新任职、受雇单位重复享受。
A. 对
B. 错
【判断题】
原扣缴义务人应当自纳税人离职不再发放工资薪金所得的次月起,停止办理专项附加扣除。
A. 对
B. 错
【判断题】
一个纳税年度内,纳税人在扣缴义务人预扣预缴税款环节未享受或未足额享受专项附加扣除的,既可以在当年内向该扣缴义务人申请补充扣除,也可以在次年3月1日至6月30日内,向汇缴地主管税务机关办理汇算清缴时申报扣除。
A. 对
B. 错
【判断题】
纳税人选择在扣缴义务人发放工资、薪金所得时享受专项附加扣除的,每年享受时应内容完整地填写并向扣缴义务人报送《个人所得税专项附加扣除信息表》。
A. 对
B. 错
【判断题】
纳税人次年需要由扣缴义务人继续办理专项附加扣除的,应及时对次年享受专项附加扣除的内容进行确认,并报送扣缴义务人。纳税人未及时确认的,次年1月起暂停扣除,待纳税人确认后再行办理专项附加扣除。
A. 对
B. 错
【判断题】
扣缴义务人向个人支付应税所得或代扣税款的,应当依法办理全员全额扣缴申报。
A. 对
B. 错
【判断题】
扣缴义务人向非居民个人支付工资、薪金所得时,应当按照累计预扣法计算预扣税款,并按月办理扣缴申报。
A. 对
B. 错
【判断题】
计算累计应预扣预缴税额时,余额为负值时,暂不退税。纳税年度终了后余额仍为负值时,由纳税人通过办理综合所得年度汇算清缴,多退少补。
A. 对
B. 错
【判断题】
居民个人提供有关信息并依法要求办理专项附加扣除的,扣缴义务人可以拒绝。
A. 对
B. 错
【判断题】
非居民个人达到居民个人条件时,一个纳税年度内税款扣缴方法保持不变。
A. 对
B. 错
【判断题】
纳税人已办理过综合所得汇算清缴后,扣缴义务人不可以办理修正申报。
A. 对
B. 错
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用