【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
推荐试题
【单选题】
我国目前采用空气质量指数表示空气质量的好坏,下列空气质量指数处于哪个值时说明空气质量良好。___
A. 75;
B. 120;
C. 305;
D. 410。
【单选题】
以下哪个是大气污染源。___
A. 火电厂烟囱;
B. 家庭炉灶;
C. 飞机;
D. 以上都是。
【单选题】
以下哪个不是大气污染物。___
A. 二氧化硫;
B. 烟尘;
C. 二氧化碳;
D. 硫化氢。
【单选题】
大气污染的类型有哪些。___
A. 局部性污染;
B. 地区性污染;
C. 广域性污染;
D. 以上都是。
【单选题】
关于大气污染,以下说法正确的是。___
A. 为防治大气污染,应该关停所有污染大气的企业和设施;
B. 大气有一定的自净能力,少量污染物进入大气后,通过物质转化和循环可以使污染物浓度降低;
C. 在刮大风的时候集中排放污染物;
D. 以上都不正确。
【单选题】
关于海洋污染,以下说法正确的是。___
A. 海洋面积巨大,自净能力很强,可以把陆地污染物集中排放到海洋里;
B. 发生赤潮后,可以通过海洋的自净能力恢复;
C. 海洋养殖要控制养殖密度和面积;
D. 以上都不正确。
【单选题】
闪电现象主要发生在。___
A. 边界层
B. 对流层
C. 平流层
D. 热层。
【单选题】
室内避震不安全的位置是哪儿。___
A. 坚固的桌下或床下;
B. 低矮、坚固的家具边;
C. 开间小、有支撑物的房间,如卫生间;
D. 阳台上。
【单选题】
崩塌、滑坡、泥石流最容易发生的地区是。___
A. 山区;
B. 平原地区;
C. 高原地区;
D. 草原地区。
【单选题】
中国大陆哪个区域地震发生最频繁。___
A. 东部地区;
B. 西部地区;
C. 华北地区;
D. 东北地区。
【单选题】
狂犬疫苗只打一针是没用的,必须要多次注射,以刺激肌体产生抗体。现在一般都是。___
A. 二针法;
B. 三针法;
C. 四针法;
D. 五针法。
【单选题】
204.在地壳中,含量较多的四种元素类型的顺序是。___
A. 氧硅铝铁
B. 碳氮氧氢
C. 氢氧氮碳
D. 铁铝硅氧。
【单选题】
206.人体中含量最多的金属元素是。___
【单选题】
下列表示铜的元素符号是。___
A. Ca;
B. Cd;
C. Cu ;
D. Cr。
【单选题】
高锰酸钾加热分解,不可能的产物是___。
A. 锰酸钾
B. 二氧化锰
C. 氧气
D. 二氧化碳
【单选题】
下列哪项不是防止金属腐蚀常用的方法。___
A. 打磨;
B. 涂油;
C. 镀铬;
D. 刷漆。
【单选题】
下列化合物中哪些全是盐。___
A. NaCL CaCL2 MgCL2;
B. NaOH Ca(OH)2 Mg(OH)2;
C. HCl HCOOH H2SO4;
D. Na2SO4 CaSO4 H2SO4。
【单选题】
厕所用清洁剂中含有盐酸,如果不慎洒到大理石地面上,会有气体产生,这种气体主要是。___
A. 氯气;
B. 氢气;
C. 氧气;
D. 二氧化碳。
【单选题】
碳酸氢钠是烤制糕点所用的发酵粉的主要成分之一,是因为其加热会放出。___
A. 氧气;
B. 二氧化碳;
C. 氯气;
D. 氢气。
【单选题】
科学家在划分固体地球为三个圈层(即地壳、地幔和地核)时,主要的根据是。___
A. 地震波传播速度的变化;
B. 科学家向地下打深井而得到的样本成分;
C. 厄尔尼诺现象;
D. 地球上高大山脉的岩层结构。
【单选题】
地球圈层主要包括。___
A. 地壳、地幔和地核;
B. 岩石圈、生物圈、水圈、大气圈;
C. 岩石圈、生物圈、水圈、大气圈、土壤圈;
D. 水圈、大气圈、生物圈。
【单选题】
空气的垂直与水平运动显著,其物质运动和能量转化,通过水分的三态变化产生一系列物理过程,反映出复杂的天气现象,故___对地表自然环境影响最大,与人类关系也最密切。
【单选题】
地球总面积约5.1亿平方千米,陆地面积约1.49亿平方千米,陆地面积与海洋面积比约为。___
A. 7:3 ;
B. 4:6;
C. 3:7;
D. 6:4。
【单选题】
全球七大洲中面积最小的洲是。___
A. 北美洲;
B. 欧洲;
C. 南美洲;
D. 亚洲。
【单选题】
在四大洋中面积最大的是。___
A. 印度洋;
B. 太平洋;
C. 印度洋;
D. 北冰洋。
【单选题】
关于我国地势特点的说法,正确的是。___
A. 地形多种多样,平原面积所占比例最大;
B. 西高东低,呈阶梯状分布;
C. 多山地高原,四周低、中间高;
D. 西高东低,山脉呈网络状分布。
【单选题】
关于我国地理概况的描述,错误的是。___
A. 地跨热带、北温带、北寒带;
B. 领土最南端在海南省,最北端在黑龙江省;
C. 位于亚洲的东部、太平洋西岸,海陆兼备;
D. 南与越南、老挝、缅甸山水相邻。
【单选题】
我国陆地面积居世界。___
A. 第一位;
B. 第二位;
C. 第三位;
D. 第四位。
【单选题】
我国陆上国界长达2万多千米,共有14个陆上邻国,其中包括。___
A. 韩国;
B. 尼泊尔;
C. 菲律宾(东南面);
D. 马来西亚。
【单选题】
(248.天气气候灾害预警信号有着不同的等级和含义。如以下图标代表。___
A. 龙卷风红色预警信号;
B. 暴风红色预警信号;
C. 台风红色预警信号;
D. 大风红色预警信号。
【单选题】
春末夏初,京津冀地区易出现的气象灾害是。___
A. 台风;
B. 洪涝;
C. 干旱;
D. 寒潮
【单选题】
蓝、黄、橙、红四种颜色的大风预警信号中,级别最高的是。___
【单选题】
天气符号代表的天气现象是___
A. 霾;
B. 雾;
C. 沙尘暴;
D. 雷电。
【单选题】
我国内流区和外流区河流,汛期都在夏季的原因是。___
A. 都受夏季风的影响;
B. 都受夏季气温的影响;
C. 都受地形的影响;
D. 外流区受夏季风影响,内流区受夏季气温影响。
【单选题】
关于水循环的错误说法是 。___
A. 水循环使水资源不断更新,数量无限;
B. 海陆间大循环和陆地循环都能使水资源得到更新;
C. 水循环联系了大气圈、水圈、岩石圈和生物圈;
D. 水循环能深刻而广泛地影响全球地理环境。
【单选题】
刺激性气体眼污染者应立即。___
A. 紧闭双眼;
B. 用干净的棉布擦拭;
C. 用大量流动清水或生理盐水彻底冲洗;
D. 送往医院。
【单选题】
以下属于室内甲醛污染主要来源的是。___
A. 瓷砖;
B. 实木地板;
C. 密度板;
D. 壁纸。
【单选题】
关于装修污染,以下哪项说法是正确的。___
A. 只要闻不到气味,室内环境就没有污染;
B. 只要装修材料达标,室内环境就没有污染;
C. 只要室内保持通风,室内空气就能确保清洁;
D. 以上说法都存在误区。
【单选题】
一种认识是不是真理,要看它。___
A. 能否满足人的需要;
B. 能否付诸实践;
C. 能否在实践中得到证实;
D. 能否被多数人认可。
【单选题】
广义的信息检索的全过程包括文献信息的___两个过程。
A. 存储和检索;
B. 存储和编排;
C. 标引和编排;
D. 存储和标引。