【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
推荐试题
【单选题】
思维的含义是___。
A. 思维是大脑的一种自然反应
B. 思维是一种低级认识过程
C. 思维是婴儿感知外界事物的方法
D. 思维是大脑对客观事物进行的间接的和概括的反应,是一种高级认识过程
【单选题】
我们通常会引导婴儿___,认识自然现象。
A. 通过观察植物来分辨白天黑夜
B. 通过观察动物来分辨季节
C. 通过观察太阳、月亮分辨白天和黑夜
D. 通过观察太阳来认识天气
【单选题】
婴儿语言发展的四个阶段顺序正确的是___。
A. 单字句,电报句,简单句,复杂句
B. 单词句,双词句,简单句,复杂句
C. 单字句,电报句,简单句,复合句
【单选题】
办事公道是指从业人员在进行职业活时要做到___
A. 追求真理,坚持原则
B. 奉献社会,助人为乐
C. 公私分开,实事求事
D. 有求必应,服务热情
【单选题】
下列选项中没有正确表达职业道德范畴特点的是___
A. 范围上的有限性
B. 内容上的稳定性
C. 遵循上的随意性
D. 形式上的多样性
【单选题】
下列关于勤劳节俭的论述中,不正确的选项是___
A. 企业可提倡勤劳,但不宜提倡节俭
B. 一分钟应看成是八分钟
C. 1996年亚洲金融危机是“饱暖思淫欲”的结果
D. 节省一块钱。就等于净赚一块钱
【单选题】
关于创新的正确论述是___
A. 不墨守成规,但也不可标新立异
B. 企业经不起折腾,大胆的闯早晚会出问题
C. 创新是企业发展的动力
D. 创新需要灵感,但不需要情感
【单选题】
企业生产经营活动中,要求员工遵纪守法是___
A. 约束人的体现
B. 有经济活动决定的
C. 人为的规定
D. 追求利益的体现
【单选题】
企业员工在生产经营活动中,不符合平等尊重要求的是___
A. 真诚相待,一视同仁
B. 互相借鉴,取长补短
C. 长幼有序,尊卑有别
D. 男女平等,友爱情善
【单选题】
职工对企业诚实守信应该做到的是___
A. 忠诚所属企业,无论何种情况始终把企业的利益放在第一位
B. 维护企业信誉,树立质量意识和服务意识
C. 保守企业秘密,不对外谈论企业之事
D. 完成本职工作即可,谋划企业发展由有见识的人来做
【单选题】
在企业经营活动中,下列选项中的___不是子夜道德功能的体现
A. 激励作用
B. 决策能力
C. 规范行为
D. 遵纪守法
【单选题】
下列不属于劳动合同内容的选项是___
A. 劳动合同期限,工作内容,劳动保护和劳动条件
B. 劳动报酬,劳动纪律,劳动合同终止条件
C. 违反劳动合同的责任
D. 劳动福利,社会保险,旅游活动,合同转让,劳务输出
【单选题】
婴儿最早出现的感觉是___
A. 视觉
B. 听觉
C. 嗅觉
D. 皮肤感觉
【单选题】
蛋白质缺乏会导致___
A. 某些皮肤病(如湿疹等)
B. 营养不良,生长发育缓慢,免疫力下降
C. 体重轻,易疲劳,头晕等
D. 消化缓慢,消化不良,便秘
【单选题】
下列不属于言语发生期三个阶段中的选项是___
A. 呀呀学语
B. 开始懂别人说话
C. 自己说词
D. 背诵诗词
【单选题】
下列对形成龋齿的原因描述不正确的选项是___
A. 乳牙牙釉质薄
B. 牙本质较松脆
C. 容易被腐蚀
D. 乳牙较小
【单选题】
婴儿发展生理方面发生变化大小的有___
A. 言语词汇,记忆力,认知能力不断提高
B. 身高,体重,器官
C. 推理和社会交往能力不断提高
D. 思维,大脑,胸围不断提高
【单选题】
感知动作思维是指___
A. 思维过程离不开直接感知的事物和操纵事物的动作的思维方式
B. 依靠事物或情景的表象及表象的联想进行的思维活动
C. 通过逻辑思考而进行的思维方式
D. 通过抽象的联想并进行逻辑思考的思维方式
【单选题】
婴儿头部骨缝的闭合时间是___
A. 6-8个月
B. 4-6个月
C. 3-4个月
D. 12个月
【单选题】
___我国对儿童期的发展过程的划分
A. 新生儿期,乳儿期,婴儿期,幼儿期,学龄期和少年期
B. 新生儿期,婴儿期,学前期,学龄期,少年期和青年期
C. 乳儿期,婴儿期,学前期,学龄期,少年期和青年期
D. 乳儿期,婴儿期,婴儿后期,学龄期,少年期青春期
【单选题】
婴儿在发展中,新特征获得的表现有___
A. 好奇,好问及生理上出现恒牙等
B. 身高,体重,器官的增长
C. 头围,臀围,胸围发生变化
D. 思维,大脑,胸围发生变化
【单选题】
___是出‘儿童健康’新概念的法律文件
A. 中国儿童发展刚要
B. 儿童权利公约
C. 未成年人保护法
D. 母婴保健法
【单选题】
下列对婴儿神经系统的特点描述不正确的选项是___
A. 左脑发育缓慢
B. 大脑功能发育不全,小脑发育晚
C. 大脑容易兴奋,易疲劳
D. 神经髓鞘化,植物神经发育不全
【单选题】
构成人体骨骼和牙齿的主要矿物质是___
【单选题】
___是婴儿虽然是生理性远视,但仍能近距离清楚事物的原因
A. 眼球前后径短
B. 眼球前后径长
C. 眼睛容易近视
D. 晶状体弹性好,调节能力强
【单选题】
小儿___多是由钙缺乏儿引起的
A. 血红细胞减少,产生贫血
B. 佝偻病和手足抽搐
C. 矮小症,异食癖,食欲减退,伤口愈合差等
D. 甲状腺功能不足,智力低下,呆傻等
【单选题】
具体形象思维是指___
A. 思维过程离开直接感知的事物和操纵事物的动作的思维方式
B. 依靠事物或情景的表象及表象的联想进行的思维活动
C. 通过逻辑思考而进行的思维方式
D. 通过表象的联想并进行逻辑思考的思维方式
【单选题】
___是容易缺乏又对婴儿发育影响较大的矿物质和微量元素
A. 钙,铁,磷,铜
B. 钙,铁,锌,碘
C. 钾,镁,钴,碘
D. 钴,氟,锌,硫
【单选题】
随年龄的增加而___的是儿童心脏的体积与身体的比例变化规律
A. 降至最低
B. 下降
C. 不变
D. 时升时降
【单选题】
___是人体的食物加工厂
A. 呼吸系统
B. 消化系统
C. 心血管系统
D. 内分泌系统
【单选题】
下列不属于言语初步发展期的三个阶段内容的___
A. 词汇的发展
B. 句式的掌握
C. 口语的表达能力
D. 说成语
【单选题】
___是对婴儿教育的错误原则
A. 尊重婴儿发展权利的原则
B. 促进婴儿全面和谐发展的原则
C. 教育第一,养育第二的教养原则
D. 以情感体验为主的原则
【单选题】
多元智能理论认为的智能包括___等7个方面
A. 音乐,自然,体育,数学逻辑,语言,人际关系,自我认识
B. 音乐,自然,舞蹈,数学逻辑,语言,人际关系,自我认识
C. 音乐,智能,形体,数学逻辑,语言,自理能力,自我认识
D. 音乐,智能,运动,数学逻辑,语言,人际关系,自我认识
【单选题】
___是知觉
A. 反映当前客观事物的个别属性的认识过程
B. 反映当前客观事物的整体属性的认识过程
C. 反映当前客观事物的个别属性的思维过程
D. 反映过去客观事物的整体属性的认识过程
【单选题】
预防婴儿食物过敏的最好方法___
A. 选择混合喂养
B. 选择母乳喂养
C. 选择人工喂养
D. 最易添加辅助食品
【单选题】
溢奶和呕吐差别的判断___
A. 溢奶是进食长时间后有少量奶溢出,呕吐是进食后有大量的食物吐出
B. 溢奶是喂奶后时间不长有少量奶溢出,呕吐是进食后有奶或食物从口中流出
C. 溢奶和呕吐的区别只是以婴儿口中溢出物的多少来判断
D. 溢奶是喂奶后不长时间内有少量的奶溢出,呕吐是进食后有大量的食物吐出
【单选题】
下面哪一组表现是由于喂养不足引起的___
A. 厌食,皮肤干皱,体重不增
B. 不停地哭闹,入睡困难,肌肉松弛
C. 便秘,皮肤干皱,面容像老人
D. 免疫功能下将,体重不足,便秘
【单选题】
在添加泥糊状食品时,要___
A. 多加些糖
B. 多加些盐
C. 避免食用过量的化学添加剂
D. 脂肪可适当的高些
【单选题】
下列对婴儿教育的特点描述不正确的选项是___
A. 通过感官来学习
B. 不会主动提问
C. 注意力不易集中
D. 需要反复教育
【单选题】
婴儿语言能力的发展与婴儿的___发育有直接的关系
A. 视觉功能
B. 咀嚼功能
C. 运动功能
D. 心肺功能