刷题
导入试题
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
推荐试题
【单选题】
装维人员应在规定时间内通过掌上家客APP()工单处理界面拨打用户电话进行上门预约。___
A. 待受理
B. 开通预约
C. 缓装
D. 开通待办
【单选题】
装维人员在登高时,最少应有()人在场。___
A. 1
B. 2
C. 3
D. 4
【单选题】
装维人员在任何电气设备上操作前,在未验明是否有电的情况下,一律按()对待。___
A. 有电
B. 无电
C. 可能有电
D. 不理睬
【单选题】
装维人员在收到家庭投诉工单()小时内,跟客户确认后如不属自己维护的区域,可以申请工单驳回。___
A. 1.5
B. 2
C. 3
D. 0.5
【单选题】
装维人员作业过程中出现头痛、头晕等轻度中暑症状时,一定要()作业。___
A. 继续
B. 休息片刻继续
C. 坚持不住再停止
D. 停止
【单选题】
自承式蝶形光缆在墙面拐弯时,弯曲半径不应小于()厘米。___
A. 8
B. 15
C. 10
D. 20
【单选题】
字节与比特位的换算,1Byte/s=()bit/s。___
A. 4
B. 8
C. 16
D. 32
【单选题】
综合信息箱内设备、线缆及端子板应做好标识,书写应清晰、端正和正确,标识内容及制作应符合()。___
A. 设计要求
B. 用户要求
C. 厂家要求
D. 公司要求
【单选题】
()负责连通OLT与所属的ONU,为OLT与ONU之间提供光传输通道,其主要功能是完成光信号功率的分配。___
A. ODN
B. FTTH
C. FTTB
D. ODF
【单选题】
()光纤叫做色散未移位光纤,又称1310nm性能最佳光纤,是目前应用最广泛的光纤。___
A. G652
B. G653
C. G654
D. G655
【单选题】
()是检查硬件问题最常用的方法。___
A. 分段法
B. 替换法
C. 隔离法
D. 交叉法
【单选题】
七个一中的一个终端是指终端管理平台分配的光猫和()。___
A. 遥控器
B. 机顶盒
C. 和目
D. 用户账号
【单选题】
1:32的光分器,光功率损耗约为()。___
A. 7.4
B. 10.5
C. 13.8
D. 17.1
【单选题】
380伏电力线路为()线。___
A. 低压
B. 中压
C. 高压
D. 以上都不是
【单选题】
5天新装投诉率=5天内的投诉工单中派单时间距装机工单归档时间小于()天的工单数量/5天新装工单数(含宽带、互联网电视、IMS)___
A. 2
B. 3
C. 4
D. 5
【单选题】
APP掌上运维待受理中的工单是因为工单未直流到()。___
A. 业务人员
B. 装机人员
C. 前台人员
D. 支撑人员
【单选题】
APP掌上运维正常登录后,点击()进行装移机工单处理。___
A. 开通待办
B. 待受理
C. 开通预约
D. 缓装
【单选题】
FTTH(光纤到户)接入方式采用()级分光时,需要在光交交接箱和光分纤箱分别跳纤。___
A. 四
B. 三
C. 二
D. 一
【单选题】
FTTH方式宽带装机工艺规范中,沿街商铺及自然村蝶形光缆开孔(空调孔)入户时,如采用墙面开孔方式入户,应选择合适的入户位置,用Φ8mm电锤在用户墙面上进行过墙开孔,开孔标准为自用户室内往用户室外进行开孔,开孔方向是()。___
A. 向上倾斜20度角
B. 向上倾斜10度角
C. 水平
D. 向下倾斜10度角
【单选题】
FTTH方式宽带装机工艺规范中,至用户侧进行光缆接续采用冷接方式时,开拨和剪切必须使用专用工具操作,不可使用替代工具,接续工序严格按照接头厂家要求,在用户侧信息箱内的皮线光缆,弯曲直径不能小于()厘米。___
A. 3
B. 4
C. 5
D. 6
【单选题】
FTTH接入用户,ONU安装基本要求有环境较好、安全、方便、便于进出线、()。___
A. 容易取电
B. 楼道内
C. 光交接箱内
D. 光分路箱内
【单选题】
FTTH宽带接入,采用二级分光方式,目前所使用的分光器分光比为()。___
A. 1:4
B. 1:8
C. 1:16
D. 1:32
【单选题】
FTTH宽带接入,采用二级分光时,二级分光器采用()。___
A. 盒式分光器
B. 插片式分光器
C. 机架式分光器
D. 以上都不是
【单选题】
FTTH宽带接入,采用一级分光方式,目前所使用的分光器分光比为()。___
A. 1:8
B. 1:16
C. 1:32
D. 0.0861111111111111
【单选题】
GPON的上行最大速率为()。___
A. 1.5Gbit/s
B. 1.25Gbit/s
C. 2.5Gbit/s
D. 1Gbit/s
【单选题】
GPON和EPON下行理论传输速率()。___
A. 相同
B. 不同
C. 有时相同,有时不同
D. 可以相同,也可以不同
【单选题】
GPON将业务带宽分配方式分成4种类型,优先级从高到低分别是()。___
A. 保证带宽、固定带宽、非保证带宽和尽力而为带宽
B. 固定带宽、保证带宽、尽力而为带宽和非保证带宽
C. 固定带宽、保证带宽、非保证带宽和尽力而为带宽
D. 保证带宽、非保证带宽、固定带宽和尽力而为带宽
【单选题】
GPON目前可以为ONU(光网络单元)提供上下行对称的带宽为()。___
A. 1.5Gbit/s
B. 1.25Gbit/s
C. 0.5Gbit/s
D. 1Gbit/s
【单选题】
GPON网络的光信号传输距离最远为()。___
A. 10km
B. 20km
C. 40km
D. 60km
【单选题】
GPON与EPON相比较,GPON的优点不包括()。___
A. 更远的传输距离
B. 更高的带宽
C. 更方便的施工
D. 综合业务支持好
【单选题】
IMS电话可根据用户需求通过()或电话三通,接入分机(多个话机)。___
A. 电话分线器
B. 路由器
C. 光猫
D. 交换机
【单选题】
ODN(光分配网络)能为()和ONU的连接提供光通道。___
A. ONT
B. OLT
C. ODF
D. BAS
【单选题】
ODN接入工程中,使用的光缆是()模光缆。___
A. 单
B. 多
C. 复合
D. 以上都不是
【单选题】
OLT(光线路终端)与ONU(光网络单元)之间相连时,不需要()。___
A. 光纤
B. 光分路器
C. 光交
D. 光收发器
【单选题】
ONT(光网络终端)不能提供()业务接口。___
A. 语音
B. E1
C. 视频
D. 数据
【单选题】
ONU光模块不在位可能的原因包括()。___
A. 光模块故障
B. 光模块所在单板或扣板故障
C. OLT故障
D. 光模块不在位
【单选题】
ONU离线的故障原因不可能的是()。___
A. ONU设备本身故障
B. ONU设备掉电
C. ONU至OLT光缆故障
D. 以上都不对
【单选题】
ONU离线的故障原因可能是()。___
A. ONU设备本身故障
B. ONU设备掉电
C. ONU至OLT光缆故障
D. 以上都对
【单选题】
ONU网管与设备通信失败的原因不包括()。___
A. 设备掉电
B. 设备和网管配置的SNMP协议不一致
C. 网络时延较大,或者当网管ping设备时,由于设备忙而没有响应网管的消息
D. OLT备板问题
【单选题】
ping命令常用的参数不包括()。___
A. -l
B. -n
C. -y
D. -t
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用