【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
推荐试题
【单选题】
下列关于航空配餐生产车间的表述,错误的是___:
A. 宜分开设置供独立使用的食品原辅材料入口、垃圾出口
B. 宜分开设置供独立使用的餐食装机出口、机上餐食及食具卸机入口
C. 宜分开设置供独立使用的人员出入口,设置人员出入专用通道
D. 机上垃圾出口和餐食及食具卸机入口可以是同一个口
【单选题】
航空配餐各生产车间应安装通风和温度控制设备,保持车间内空气流动和所要求的温度应以___温度为宜。
A. 25℃
B. 22℃以下
C. 20℃
D. 18℃
【单选题】
航空配餐公司应设置专门的清洗、消毒车间,对飞机上卸下的非一次性食具进行清洗和消毒的程序应为___。
A. 按食具回收→分检→清洗→消毒→储藏→再使用的程序
B. 按食具回收→清洗→分检→储藏→消毒→再使用的程序
C. 按食具回收→清洗→分检→消毒→储藏→再使用的程序
D. 按食具回收→清洗→消毒→分检→储藏→再使用的程序
【单选题】
烹煮食品时要达到安全的中心温度以上:禽类和肉糜、肉馅类中心温度和其他食品中心温度应分别达到___。
A. 74℃以上和78℃以上
B. 70℃以上和74℃以上
C. 76℃以上和74℃以上
D. 74℃以上和70℃以上
【单选题】
已烹制的食品经过快速冷却后加以冷藏,烹制完成后___内,食品中心温度应由()降至()以下。
A. 6小时;65℃;10℃
B. 6小时;70℃;20℃
C. 4小时;70℃;10℃
D. 4小时;65℃;10℃
【单选题】
下列关于航空配餐生产配制和包装的表述,错误的是___:
A. 装配餐盒时,不宜将小包装的成品食品、纸巾餐具、带皮水果等与无包装的食品放在一起,除非各种食品均单独封装或覆以消毒的保鲜膜
B. 用于食品包装的薄膜、纸箱(盒)、包装纸、锡箔盒、塑料制品等材料应符合国家卫生标准有关规定
C. 餐食应当避开冷库中的风扇下方存放,防止冷凝水滴下造成污染
D. 配餐放入过渡冷库至出冷库装机之间的时间间隔不应超过48小时
【单选题】
下列关于机上配餐卫生管理的做法,错误是___:
A. 配餐自过渡冷库中取出时表面温度在5℃以下,到达机上时表面温度在10℃以下
B. 餐自过渡冷库中取出时表面温度在5℃以下,配餐出库时间距航班预计起飞时间在3h之内
C. 机上有冷藏设施者,迅速启动冷藏设施,保证配餐在10℃以下保存,可在机上保存12h
D. 已经装机的餐食温度在15℃以下,保存4h之内,不必更换
【单选题】
重要航班供应的食品成品应留样。留样食品应盛放于清洁的专用容器内,在冷藏条件下存放___以上,每个品种留样量不少于(D),建立检验记录制度和生产过程安全管理记录制度。所有记录保持不得少于(D)。
A. 24 h;100 g;2年
B. 24 h;200 g;1年
C. 48 h;100 g;1年
D. 48 h;100 g;2年
【单选题】
航空配餐生产企业在采购的成品和食品原料、食品添加剂及食品相关产品时验收首先需要验收的是___。
A. 按供货批次查验供应商提供的产品合格证明文件
B. 查验货物温度
C. 到现场审查
D. 对生产企业的产品质量管理体系进行持续管理
【单选题】
截获输入性活鼠或来自鼠疫流行区死鼠及经总署专家组确认和复核属于全国口岸首次截获的病媒生物应在___报告总署。
A. 2小时之内
B. 8小时之内
C. 12小时之内
D. 24小时之内
【单选题】
入境船舶的蚊类和蝇类等双翅目病媒生物监测调查应白天在检疫锚地停泊期间进行,锚位距陆地距离不少于___,或在船舶靠泊后(A)内进行。
A. 1000 m;1h
B. 800 m、2 h
C. 400 m、4 h
D. 100 m、24 h
【单选题】
开展入境船舶输入性病媒生物监测工作中,在采集并保存病媒生物时由___陪同人员确认。
A. 旅行社
B. 船方
C. 代理公司
D. 海事部门
【单选题】
在国境口岸或者交通工具上发现___有反常死亡或者死因不明的,国境口岸有关单位或者交通工具的负责人,必须立即向卫生检疫机关报告,迅速查明原因,实施卫生处理。
【单选题】
采用鼠夹法监测鼠密度,应连续布放___。
【单选题】
___不属于口岸区域鼠类常用监测方法。
A. 鼠笼法
B. 鼠夹法
C. 目测法
D. 粉迹法
【单选题】
采用粉迹法监测鼠类密度时,滑石粉块的尺寸是___。
A. 20cm×20cm
B. 30cm×30cm
C. 40cm×40cm
D. 50cm×50cm
【单选题】
___不属于蚊虫幼虫监测指标。
A. 容器指数
B. 刺叮指数
C. 房屋指数
D. 布雷图指数
【单选题】
___不属于蚊虫成虫监测方法。
A. 人帐诱法
B. 人工小时法
C. 小黑板法
D. 诱蚊器收集法
【单选题】
___不属于蝇类成虫监测方法。
A. 诱蝇笼诱捕法
B. 捕蝇网网捕法
C. 直接目测法
D. 路径指数法
【单选题】
___是仓鼠科特征。
A. 背部有背囊
B. 尾部有尾囊
C. 口中两侧有颊囊
D. 腹部腹面有腹囊
【单选题】
加工生鲜肉、禽、鱼虾类及其制品,应采用可靠的热加工工艺对食品进行熟化杀菌处理,确保食品中心温度达到___限值并至少保持(D)。
A. 72度;10秒
B. 70度;15秒
C. 63度;10秒
D. 74度;15秒
【单选题】
依照《国境口岸病媒生物监测规定》,国境口岸区域病媒生物监测范围为国境口岸及周边____的环境,各海关可根据本口岸实际适当扩大监测范围。
A. 200米
B. 400米
C. 800米
D. 1000米
【单选题】
___不属于鼠类及体表寄生虫携带的病原体。
A. 鼠疫耶尔森菌
B. 汉坦病毒
C. 黄病毒属病毒
D. 致病性钩端螺旋体
【单选题】
病媒生物死体样本运送,如果在24h内不能到达实验室的,运送过程中箱内温度应保持在___。
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物死体样本运送,如果在装箱后4h内能够到达实验室的,运送过程中箱内温度应保持在___。
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
病媒生物的死体样本运送,如果4h-24h内能到达实验室的,应将样品置于-30℃冷冻后再送样,运送过程中箱内温度应保持在___。
A. 4℃以下
B. 0℃以下
C. -20℃以下
D. 4℃以上
【单选题】
恰加斯病也称为美洲锥虫病,其重要的传播媒介是___。
A. 采采蝇
B. 厩螫蝇
C. 锥蝽
D. 埃及伊蚊
【单选题】
___是黑热病内脏利什曼病的主要传播媒介。
【单选题】
___不适用于入出境集装箱携带蝇、蚊、蠓的采集。
A. 挥网法
B. 电动吸蚊器法
C. 直接捡取法
D. 二氧化碳诱蚊灯法
【单选题】
入境航空器应在___开始病媒生物监测。
A. 卸货完成后
B. 抵达后
C. 等航空公司通知
D. 发现病媒生物时
【单选题】
进行集装箱携带输入性病媒生物监测时应准备的个人防护用品包括___。
A. 乳胶手套、防护服
B. 防毒面具
C. 自给式呼吸器
D. 化学防护服
【单选题】
若要对采集到的输入性鼠类进行携带的病毒进行检测,取得其内脏器官的保存温度是___。
A. -80℃或以下
B. 0℃
C. 常温
D. 4℃-8℃
【单选题】
___蜱类假头基通常为矩形。
A. 花蜱属
B. 璃眼蜱属
C. 扇头蜱属
D. 异扇头蜱属
【单选题】
___鉴别特征是:体型较大,前胸背板具褐色蝶形大斑,其后缘中央向后延伸不达后缘,且前缘具“T”型黄斑。
A. 黑胸大蠊
B. 美洲大蠊
C. 德国小蠊
D. 褐斑大蠊
【单选题】
___鉴别特征是:中胸侧板有垂直的侧板杆,无颊栉和前胸栉,后头鬃2列,前足第5跗节具3根刺形亚端腹鬃,受精囊为“C”型。
A. 人蚤
B. 二齿新蚤
C. 印鼠客蚤
D. 犬栉首蚤
【单选题】
___不属于栉眼蚤属。
A. 云南栉眼蚤
B. 方叶栉眼蚤
C. 同源栉眼蚤指名亚种
D. 偏远古蚤
【单选题】
___是指在入境口岸采取卫生措施控制或杀灭行李、货物、集装箱、交通工具、设施、物品和邮包中存在的传播人类疾病的啮齿类媒介的程序。
A. 除虫
B. 消毒
C. 灭鼠
D. 卫生处理
【单选题】
___是指采用卫生措施利用化学或物理制剂的直接作用控制或杀灭人体或动物身体表面或行李、货物、集装箱、交通工具、物品和邮包中上的传染性病原体的程序。
A. 除虫
B. 消毒
C. 灭鼠
D. 卫生处理
【单选题】
___是指采用卫生措施控制或杀灭行李、货物、集装箱、交通工具、物品和邮包中传播人类疾病的昆虫媒介的程序。
A. 除虫
B. 消毒
C. 灭鼠
D. 卫生处理