刷题
导入试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
推荐试题
【单选题】
新接入公安网的机器对其IP地址进行配置后,开始可以上网,但是一段时间后提示IP地址冲突,且不能上网,最有可能的原因是:___
A. 未进行"一机两用"注册
B. 使用的是盗版系统
C. 未向信通部门打报告
D. 有其他机器于该机器配置了相同的IP地址
【单选题】
在Word常用工具栏中,"格式刷"可用于复制(传递)文本或段落的格式,若要将选择中的文本或段落格式重复应用多次,则最有效的操作方法是___
A. 双击格式刷按钮
B. 右击格式刷按钮
C. 单击格式刷按钮
D. 拖动格式刷按钮
【单选题】
如果使用键盘将插入点直接移动到当前文档的末尾,其操作方法是按___
A. Ctrl+Shift+End
B. Ctrl+End
C. Shift+End
D. Alt+End
【单选题】
要想在IE中看到您最近访问过的网站的列表可以___
A. 按Ctrl+F键
B. 单击"标准按钮"工具栏上的"历史"按钮
C. 单击"后退"按钮
D. 按下BackSpace键
【单选题】
如果电子邮件到达时,你的电脑没有开机,那么电子邮件将___
A. 保存在服务商的主机上
B. 自动保存到你的电脑上
C. 过一会儿对方重新发送
D. 退给发信人
【单选题】
下列操作,哪一种是正确的断开计算机与网络连接的方法___。
A. 拔掉拔号网络适配器上的电话线
B. 双击桌面右下角任务栏中表示网络连接状态的图标,单击断开连接
C. 拔掉显示器与主机电源
D. 重新启动计算机
【单选题】
WindowsXP的用户不包括:___
A. 管理员账户
B. 来宾账户
C. 审计账户
D. 普通账户
【单选题】
如果要控制计算机在Internet上可以访问的内容类型,可以使用IE的___功能。
A. 实时监控
B. 分级审查
C. 远程控制
D. 病毒查杀
【单选题】
在Word菜单栏的"窗口"菜单中,排列着若干个文档名,它们是___
A. 目前处于排队打印的文档文件名
B. 最近编辑过的文档文件名
C. 当前目录中所有文档文件名
D. 当前已经打开的文档文件名
【单选题】
一般操作系统的主要功能是___
A. 对汇编语言.高级语言和甚高级语言进行编译
B. 管理数据库文件
C. 控制和管理计算机系统软.硬件资源
D. 管理用各种语言编写的源程序
【单选题】
在全国在逃人员系统里可以按___条件进行查询
A. 身份证号
B. 现住址
C. 籍贯
D. 单位
【单选题】
在Word文档中,下列叙述有错误的是___。
A. 不能接受其它文字处理软件编辑的文本文件
B. 可以自动实现英文的自动校正功能,当出现错误时,用红线做标记
C. 允许在图文框内插入图片
D. 不能在DOS环境中使用
【单选题】
《公安机关人民警察使用公安信息网违规行为行政处分暂行规定》中规定的最高处分为___
A. 警告处分
B. 撤职或开除
C. 刑事处理
D. 记大过
【单选题】
为什么不准在公安网上开设与工作无关的视屏图像播放___。
A. 可能造成传输线路资源紧张
B. 可能传播病毒
C. 可能造成涉密文件泄露
D. 可能造成系统安全
【单选题】
警务通是___。
A. 民警的私人财物
B. 单警装备
C. 领导的私人财物
D. 不清楚
【单选题】
Excel的三个主要功能是___。
A. 图表、电子表格、公式计算
B. 文字输入、表格、公式
C. 公式计算、图表、表格
D. 电子表格、图表、数据库
【单选题】
在下列关于Word文档窗口的叙述中,正确的是___。
A. 可以同时打开多个文档窗口,被打开的窗口都是活动窗口
B. 可以同时打开多个文档窗口,但其中只有一个是活动窗口
C. 可以同时打开多个文档窗口,但在屏幕上只能见到一个文档窗口
D. 只允许打开一个文档窗口,当打开第二个文档窗口时自动关闭前一个窗口
【单选题】
搜狗是一个不错的中文搜索引擎,其特点是___,特别适合用户按照其提供的分类表进行浏览查询。
A. 信息量巨大
B. 信息完整
C. 信息全面
D. 信息分类较好
【单选题】
在输入中文时,下列的___操作可以快速进行中英文切换
A. 用鼠标右键单击中英文切换按钮
B. 用SHIFT+空格键
C. 用CTRL+空格键
D. 用ALT+空格键
【单选题】
虽然网络正常,但是由于没有进行公安网入网注册,会导致计算机___。
A. 系统重启
B. 系统蓝屏
C. 长时间不注册会被阻断连接
D. 没有任何影响
【单选题】
在Word文档中,如果想要设置定时自动保存,应按下列___步骤操作
A. 选择菜单"工具"→"选项"→"保存"标签
B. 选择菜单"文件"→"保存"项
C. 选择菜单"工具"→"自定义"项
D. 选择菜单"文件"→"属性"项
【单选题】
警务通在信息采集是,属于必填项的是___。
A. 蓝色数据
B. 红色数据
C. 灰色数据
D. 黑色数据
【单选题】
正确关闭投影仪的方式,___。
A. 不知道如何处理
B. 关闭开关后等机器散热完成后自动停机
C. 关闭开关后马上断开电源
D. 直接断开电源
【单选题】
判断下面哪一句话是正确的。___。
A. Internet中的一台主机只能有一个IP地址
B. 一个合法的IP地址在一个时刻只能分配给一台主机
C. IP地址与主机名是一一对应的
D. Internet中的一台主机只能有一个主机名
【单选题】
为了预防计算机病毒,对于外来移动硬盘应采取___。
A. 随便使用
B. 先查毒,后使用
C. 禁止使用
D. 使用后,就杀毒
【单选题】
全国公安综合信息查询系统中,身份证条件查询需要多值即多个身份证号输入时,每个号码之间需要用___隔开。
A. ,
B.
C. ?
D. #
【单选题】
下列windowsxp账户管理注意事项中说法错误的是:___
A. 任何类型的用户都可以进行添加和删除账户的操作
B. 系统至少应该有一个管理员用户
C. 只有管理员用户才可以进行添加.删除账户的操作
D. 不能删除当前正在使用的账户
【单选题】
对于喜欢的页面,应该怎样保存到本地硬盘___。
A. 按CTRL+A全选页面,然后单击右键,选复制,然后粘贴到指定目录
B. 在窗口中选择文件/另存为,选择保存的目录,并选择WEB格式,保存
C. 拖动鼠标全选页面,然后单击右键,选目标另存为
D. 按CTRL+A全选页面,然后单击右键,选目标另存为
【多选题】
劳力性热射病的特点是:___
A. 受损器官系统多
B. 各器官衰竭程度重
C. 病情恶化快
D. 病死率高
【多选题】
热射病治疗之关键技术——血液净化的目的是:___
A. 有效降温
B. 清除大量炎性介质,减轻 SIRS 反应程度
C. 有效清除肌红蛋白、胆红素、有害免疫物质等
D. 调节电解质、酸碱,使机体很快达到新的内环境平衡。
【多选题】
出现先兆中暑症状,并具备以下情况之一者,可诊断为轻症中暑:___
A. 面色潮红、皮肤灼热
B. 呼吸急促、胸闷加剧
C. 脉搏细弱,血压下降
D. 体温往往在 38℃以上
【多选题】
发生热射病后高热对心血管的损害为:___
A. 心输出量下降
B. 血压低,无尿
C. 心动过速、室上速
D. 心肌细胞变性、坏死
【多选题】
发生热射病后高热对消化系统的损害为:___
A. 肝细胞坏死和胆汁淤积,严重者可发生急性肝衰竭
B. 肠粘膜缺血,通透性增加,水样便,血便
C. 肠道屏障功能减弱,菌群移位,感染
D. 创伤性胰腺炎,淀粉酶、脂肪酶升高。
【多选题】
信息化战场高技术武器特点是___
A. 躯体创伤合并精神创伤多
B. 烧伤、多发伤、重伤害多
C. 复合伤、部位伤、隐蔽伤多
D. 直接伤并发间接损伤、远后效应多
【多选题】
现代战争特点包括___
A. 多维化
B. 全纵横
C. 全方位
D. 立体化
【多选题】
引起劳力性热射病的危险因素有___
A. 环境因素
B. 个人因素
C. 组织因素
D. 诊疗因素
【多选题】
培养复合全能的战伤救护护士应具备___
A. 掌握基本的军事理论和技术,做一个战斗员;
B. 掌握救护知识和技术,做一个战伤救护员;
C. 完成高强度的救治工作;
D. 具备自身防护、遇到紧急情况时自救互救以及心理应激干预能力
【多选题】
战场死亡的前三位可逆性原因___
A. 肢体大出血
B. 张力性气胸
C. 气道梗阻
D. 烧伤
【多选题】
TCCC实施阶段包括哪些___
A. 火线救护
B. 战术区域救护
C. 战术中救护
D. 战术后送救护
【多选题】
静脉输液建立的指征___
A. 无法吞咽
B. 呕吐
C. 失血性休克
D. 意识水平下降
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用