刷题
导入试题
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
推荐试题
【单选题】
有关膈的悦法,错误的是___
A. 是向上隆起的扁肌
B. 中央部为腱膜
C. 有主劫脉裂孔. 食管裂孔和腔静脉孔
D. 为重要的呼吸肌
E. 收縮吋膈頂上升
【单选题】
一侧胸锁乳突肌收缩肘,作用是___
A. 斗屈向同侧,脸装向对侧
B. 屈向对侧,脸装向同侧
C. 斗屈向同侧,脸装向同侧
D. 尖屈向对侧,脸装向对侧
E. 尖屈向后方,脸装向前方
【单选题】
最重要的呼吸肌是___
A. 腹肌
B. 肋回肌
C. 膈
D. 胸大肌
E. 前锯肌
【单选题】
属于躯干肌的是___
A. 斜方肌
B. 三角肌
C. 图上肌
D. 旋后肌
E. 臀大肌
【单选题】
肝脏面可分位___
A. 2叶
B. 3叶
C. 4叶
D. 5叶
E. 6叶
【单选题】
从肝门出入的结构不包括___
A. 神经
B. 肝门静脉
C. 肝固有劫脉
D. 肝静脉
E. 肝管
【单选题】
临床上区别内外痔的示志是___
A. 肛柱
B. 肛瓣
C. 肛多
D. 齿状线
E. 白线
【单选题】
麦氏点位于___
A. 脐与右骼结连线的中.外的1/3交点处
B. 脐与右骼前上棘连线的中1/3处
C. 脐与右骼嶬连线的中1/3处
D. 脐与右骼结市连线的中.内/3交点处
E. 脐与右骼前上棘连线的中.外1/3交点处
【单选题】
具有结肠帶.结肠袋.肠脂垂的消化管是___
A. 大肠
B. 阑尾
C. 空肠与回肠
D. 直肠与肛管
E. 盲肠与结肠
【单选题】
有关回肠的说法,何者错误___
A. 坏状壁高而密
B. 全状有系膜
C. 管径比空肠细
D. 表面无肠脂垂
【单选题】
有关空.回肠错误的说法是___
A. 空肠位于左上腹,回肠在右腹
B. 空肠占空.回肠全长的3/5
C. 空肪管径大,回肪管径小
D. 空肠壁厚,回肠壁薄
E. 空肠血管キ富,回肠血管较
【单选题】
十二指肠大乳头位于___
A. 十二指肠球
B. 降部的后内侧壁
C. 水平部的前壁
D. 上部的前壁
E. 升部的后壁
【单选题】
胃可分为那几部分___
A. 胃底.胃体.胃窦
B. 胃体.胃小弯.胃大弯.胃
C. 胃底.胃体.幽门部.贲门部
D. 胃大弯.幽门部.责门部.体
E. 胃小弯.门部.幽门部.底
【单选题】
胃中等充盈时,大部分位于___
A. 右季肋区
B. 左季肋区
C. 腹上区
D. 脐区
E. 左季肋区和腹上区
【单选题】
扁桃体位于___
A. 梨状隐窝
B. 鼻咽部
C. 咽隐窝
D. 喉咽部
E. 腭舌弓与腭咽弓之同的凹窝
【单选题】
咽隐窝位于___
A. 咽鼓管咽口的上方
B. 咽鼓管咽口后上方
C. 咽鼓管咽口的前下方
D. 喉咽的两侧
E. 梨状隐窝的上方
【单选题】
咽鼓管咽口的位置在___
A. 鼻咽的侧壁
B. 鼻咽的后壁
C. 口咽的侧壁
D. 口咽的后壁
E. 喉咽的侧壁
【单选题】
关于咽的描述,哪项是错俣的___
A. 内前后略扁的肌性管道
B. 是消化道和呼吸道共享的通
C. 前壁完整
D. 下端移行为食管
E. 借咽峡与口腔相通
【单选题】
下颌下腺早管开口于___
A. 舌下壁
B. 舌下阜
C. 舌系帶
D. 舌乳决
E. 舌粘膜
【单选题】
腮腺导管开口于哪个牙相对的颊粘膜上___
A. 上颌第一前磨牙
B. 上颌第二前磨牙
C. 上颌第一磨牙
D. 上颌第二磨牙
E. 上颌第三磨牙
【单选题】
不含味蕾的舌乳头是 ___
A. 菌状乳头
B. 丝状乳头
C. 轮廓乳头
D. 叶状乳头
E. 舌下壁
【单选题】
⌐6表示___
A. 左下领第1磨牙
B. 右下颔第1乳磨牙
C. 右下颔第1磨牙
D. 左下领第2乳磨牙
E. 左下领第3磨牙
【单选题】
观察活体口腔肘,不能看到的结构是___
A. 腭垂
B. 牙颈
【单选题】
下列关于口腔的描述,那项是错俣的___
A. 是消化管的起始
B. 前壁是上.下牙弓
【单选题】
与肝的防御功能有关的细胞是___
A. 肝细胞
B. 肝血窦的内皮细胞
C. 小叶同血管的内皮细胞
D. 肝巨噬细胞
E. 贮脂细胞
【单选题】
肝的基本结构単位是___
A. 肝板
B. 肝细
C. 肝血窦
D. 胆小管
E. 肝小叶
【单选题】
产生胆汁的细胞是___
A. 肝细胞
B. 贮脂细胞
C. 胆小管上皮细胞
D. 胆囊粘膜上皮细胞
E. 肝血窦的内皮细胞
【单选题】
不属于肝门管区的结构是___
A. 小叶间幼脉
B. 小叶间静脉
C. 结缔组织
D. 小叶下静脉
E. 小叶间胆管
【单选题】
关于肝门管区的三种管道的描述,下述那项为___
A. 小叶间劫脉来自肝固有劫脉
B. 小叶V静脉来自肝静脉
C. 小叶间胆管会合成肝管
D. 三种管道相互伴行
E. 小叶动静脉的分支通肝血窦
【单选题】
构成胆小管壁的是___
A. 扁平细胞
B. 肝细胞的细胞膜
C. 肝巨噬细胞
D. 平滑肌细胞
E. 单层立方上皮细胞
【单选题】
小肠内与脂肪吸收有关的结构是___
A. 毛细血管
B. 中央乳糜管
C. 腺
D. 结缔组织
E. 平滑肌纤维
【单选题】
组成筋绒毛中轴的结构不包括___
A. 吸收细胞和杯状细胞
B. 散在的平滑肌纡维
C. 毛细淋巴管
D. 毛细血管
E. 结缔组织
【单选题】
胃底腺的壁细胞分泌___
A. 盐酸
B. 胃蛋白酶
C. Na离子
D. 粘液
E. 溶菌酶
【单选题】
消化管的肌层___
A. 全部由平滑肌构成
B. 全部由骨骼肌构成
C. 大部分由平滑肌构成
D. 大部分由骨骼肌构成
E. 大部分由平滑肌和骨骼肌混合构成
【单选题】
临床手术切除器官,可不经腹膜腔的是___
A. 胃
B. 阑尾
C. 肾
D. 脾
E. 胆囊
【单选题】
站立位时,女性腹膜腔的最低部位是___
A. 髂窝
B. 膀胱子宫陷凹
C. 坐骨肛门窝
D. 直肠子宫陷凹
E. 直肠膀胱陷凹
【单选题】
属于腹膜外位器官的是___
A. 子宫
B. 十二指肠上部
C. 肾
D. 脾
E. 阑
【单选题】
与腹膜腔相通的管道是___
A. 输尿管
B. 输精管
C. 输卵管
D. 食管
E. 气管
【单选题】
腹膜腔___
A. 内含大量浆液
B. 由衬于腹.盆腔脏器表面的脏腹膜相互移行而成
C. 由衬于腹.盆腔内面的壁腹膜相互移行而成
D. 由壁腹膜与脏腹膜相互移行成
E. 男.女性的腹膜腔都是密闭的腔隙
【单选题】
站立位时,男性腹膜腔的最低部位是___
A. 十二指肠下隐窝
B. 乙状结肠间隐窝
C. 肝肾隐窝
D. 直肠膀胱陷凹
E. 盲肠后隐窝
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用