刷题
导入试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
推荐试题
【单选题】
肝性脑病患者出现烦躁不安时,最好选用___
A. 氯丙嗪
B. 吗啡
C. 地西泮
D. 硫芬妥纳
E. 哌替啶
【单选题】
不属于门静脉高压的侧支循环___
A. 食管下段静脉曲张
B. 脐周静脉曲张
C. 腹壁静脉曲张
D. 痔静脉曲张
E. 下肢静脉曲张
【单选题】
肝性脑病患者使用精氨酸的目的是___
A. 保护肝细胞
B. 使肠内呈酸性,减少氨吸收
C. 减少锰中毒
D. 抑制脑内假神经递质合成
E. 与游离氨结合,从而降低血氨
【单选题】
患者,男性,46岁,有嗜酒史。近2年来常感腹胀,食欲减退,齿龈出血,但仍坚持工作。最近1周来下肢水肿明显,昨晚呕血后进入昏迷状态。应考虑___
A. 肝性脑病
B. 乙醇(酒精)中毒性昏迷
C. 糖尿病酮症昏迷
D. 尿毒症性昏迷
E. 低血糖昏迷
【单选题】
患者,男性,52岁,中午饱餐1小时后突然出现中.上腹部剧烈的刀割样疼痛,且向腰背部放射,继而呕出胆汁,伴高热.面色苍白。急诊入院检查时全腹疼痛,腹肌强直。紧急处理措施不妥的是___
A. 静脉输液
B. CT检查
C. 检查
D. 解痉止痛
E. 鼻饲流质
【单选题】
肝穿刺的部位___
A. 右锁骨中线第2肋间
B. 右腋中线第8~9肋间
C. 右锁骨中线第9~10肋间
D. 右锁骨中线第5~6肋间
E. 右腋中线第9~10肋间
【单选题】
原发性肝癌早期诊断的主要血检指标是___
A. AFP
B. ALT
C. AST
D. LDHE
E. 血清铁蛋白
【单选题】
当前诊断小肝癌和微小肝癌的最佳检查方法是___
A. 超
B. T
C. 穿刺活检
D. 线肝血管造影
E. 射性核素肝显像
【单选题】
主细胞分泌___
A. 碱性黏液
B. 盐酸
C. 胃泌素
D. 胃蛋白酶原
E. 胃液
【单选题】
十二指肠溃疡发生的原因主要是___
A. 吸烟
B. 喝酒
C. 损害因素增强
D. 粘膜修复快
E. 胃液减少
【单选题】
幽门梗阻时呕吐特点___
A. 鲜血
B. 咖啡样
C. 喷射性
D. 隔夜食物
E. 食后即吐
【单选题】
腹泻时应观察患者以下何种表现___
A. 食欲不振
B. 恶心呕吐
C. 烦躁不安
D. 脱水或电解质紊乱
E. 头痛
【单选题】
急性胰腺炎患者为抑制或减少胰液分泌的措施是___
A. 补充液体
B. 吸氧
C. 胃肠减压
D. 纠正休克
E. 解痉镇痛
【单选题】
呈喷射状呕吐的是___
A. 急性胃炎
B. 胃溃疡
C. 慢性胃炎
D. 颅内高压症
E. 十二指肠溃疡
【单选题】
小肠病变引起的腹痛部位为___
A. 上腹正中
B. 左下腹
C. 右肋下
D. 右下腹
E. 脐周
【单选题】
早期胃癌是指___
A. 癌肿小于1cm,无淋巴结转移
B. 癌肿浸润不超过粘膜下层,不论有无局部淋巴结转移
C. 癌肿浸润超过肌层,不论有无局部淋巴结转移
D. 癌肿面积大于3cm
E. 癌肿浸润粘膜层.粘膜下层及肌层
【单选题】
黏液细胞分泌___
A. 盐酸
B. 胃蛋白酶原
C. 胃泌素
D. 胃液
E. 碱性黏液
【单选题】
胃溃疡的发生原因主要是___
A. 保护因素削弱
B. 氧自由基
C. 精神紧张
D. 胆汁反流
E. 胃壁血供减少
【单选题】
消化性溃疡的治疗原则是___
A. 采取综合性治疗的措施
B. 丰富胃壁血运
C. 增强粘膜更新
D. 消除精神紧张
E. 阻止胆汁反流
【单选题】
易导致癌变的胃炎是___
A. 肥厚性胃炎
B. 胃窦胃炎
C. 胃体胃炎
D. 萎缩性胃炎
E. 浅表性胃炎
【单选题】
即可杀灭幽门螺旋杆菌,又可保护胃粘膜的药物是___
A. 甲硝唑
B. 黄连素
C. 阿莫西林
D. 呋喃唑酮
E. 次枸橼酸铋
【单选题】
幽门螺旋杆菌阳性的慢性胃炎三联疗法包括___
A. 阿莫西林+甲硝唑+次枸橼酸铋
B. 利福平+甲硝唑+乙胺丁醇
C. 氯霉素+红霉素+链霉素
D. 黄连素+呋喃唑酮+链霉素
【单选题】
上消化道出血的临床表现最主要取决于___
A. 病变部位的高低
B. 出血量与出血速度
C. 出血前患者全身情况
D. 病变性质的良恶
E. 出血时患者的抵抗力
【单选题】
使用三腔二囊管压迫止血过程中,突然呼吸困难.发绀.应立即行何种处理___
A. 上呼吸机
B. 清除呼吸道分泌物
C. 高流量吸氧
D. 静脉注射呼吸兴奋剂
E. 抽出气囊气体,同时检查是否脱出
【单选题】
男性,急性腹痛发作10小时入院,下列哪项检查对诊断急性胰腺炎最有价值___
A. 血清谷丙转氨酶测定
B. 血清脂肪酶测定
C. 血电解质测定
D. 血清钙测定
E. 血清淀粉酶测定
【单选题】
原发性肝癌最早.最常见的转移方式是___
A. 直接蔓延
B. 肝内血行转移
C. 种植转移
D. 肝外血行转移
E. 淋巴转移
【单选题】
胃溃疡并发幽门梗阻不宜服用___
A. 氧化镁
B. 澳丙胺太林(普鲁本辛)
C. 钙铋镁(胃得乐)
D. 氢氧化铝凝胶
E. 硫糖铝
【单选题】
胃溃疡和十二指肠溃疡的确诊依据是___
A. 胃镜检查
B. 胃肠钡餐检查
C. 血常规
D. 幽门螺旋杆菌(Hp)检查
E. 胃液分析
【单选题】
溃疡病患者失去原有的节律性腹痛,大便隐血试验持续阳性,首要考虑___
A. 幽门梗阻
B. 溃疡出血
C. 溃疡癌变
D. 溃疡活动
E. 溃疡穿孔
【单选题】
肝脏的血液供应有3/4来自___
A. 肝动脉
B. 肺静脉
C. 上腔静脉
D. 腹主动脉
E. 门静脉
【单选题】
某胃溃疡患者服用西咪替丁后出现全身乏力.皮疹.腹泻,血白细胞计数为3.4×10_TagUpStart_9_TagUpEnd_/L,您将采取下列哪项措施___
A. 立即停药
B. 加服抗过敏药
C. 缩短疗程
D. 加倍服用
E. 剂量减半
【单选题】
有一肝硬化腹水患者,突然出现腹痛和发热,体温38.5℃,血白细胞计数为14.0×10_TagUpStart_9_TagUpEnd_/L,腹水混浊,经培养有大肠埃希菌生长。该患者可能并发___
A. 脓毒血症
B. 胆道感染
C. 自发性腹膜炎
D. 结核性腹膜炎
E. 败血症
【单选题】
下列哪一项不是肝硬化失代偿期肝功能减退的临床表现___
A. 侧支循环建立
B. 面色灰暗黝黑
C. 乏力
D. 出血倾向
E. 性欲减退
【单选题】
肝硬化患者血清白蛋白低于25g/L时会出现___
A. 感染
B. 出血
C. 腹水
D. 营养不良
E. 肝细胞坏死
【单选题】
三腔二囊管放置24小时后,需放气并放松牵引的目的是___
A. 防止胃受压
B. 避免胃扩张
C. 暂时解除胃底贲门受压
D. 证实出血是否停止
E. 预防囊壁和胃粘膜粘连
【单选题】
患者,男性,56岁,常于餐后3~4小时上腹部胀痛,进食后缓解。最近1周来中上腹部持续性胀痛,较以往严重,伴恶心.呕吐。2小时前呕血一次后十分紧张,气促明显,测血压为13.7/9.6kPa(103/72mmHg)。您认为该患者潜在的护理问题是下列哪一项___
A. 疼痛
B. 体液不足
C. 活动无耐力
D. 焦虑
E. 休克
【单选题】
患者,男性,28岁,5年来空腹胃痛.反酸,有出血史,伴恶心.呕吐。检查:腹软,中上腹部有轻度压痛。胃液分析最大酸分泌42mmol/h,胃镜示十二指肠球部溃疡。下列哪个护理问题不妥___
A. 溃疡病
B. 舒适的改变
C. 体液不足
D. 疼痛
E. 知识缺乏
【单选题】
三腔二囊管压迫止血的部位是___
A. 胃体部
B. 胃底贲门部
C. 胃大弯
D. 胃窦部
E. 胃小弯
【单选题】
三腔二囊管压迫过程中,若胃气囊阻塞咽喉时患者会出现___
A. 窒息
B. 胸闷
C. 恶心
D. 喉头水肿
E. 低氧血症
【单选题】
溃疡性结肠炎的临床表现一般不包含___
A. 腹痛
B. 腹泻与便秘
C. 便血
D. 黄疸
E. 贫血
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用