刷题
导入试题
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
推荐试题
【单选题】
钢瓶使用后,剩余的残压一般为___。
A. 1大气压
B. 不小于1大气压
C. 10大气压
D. 不小于10大气压
【单选题】
下列几种物质对原子吸光光度法的光谱干扰最大的是___。
A. 盐酸
B. 硝酸
C. 高氯酸
D. 硫酸
【单选题】
原子吸收光度法中,当吸收线附近无干扰线存在时,下列说法正确的是___。
A. 应放宽狭缝,以减少光谱通带
B. 应放宽狭缝,以增加光谱通带
C. 应调窄狭缝,以减少光谱通带
D. 应调窄狭缝,以增加光谱通带
【单选题】
关闭原子吸收光谱仪的先后顺序是___。
A. 关闭排风装置、关闭乙炔钢瓶总阀、关闭助燃气开关、关闭气路电源总开关、关闭空气压缩机并释放剩余气体
B. 关闭空气压缩机并释放剩余气体、关闭乙炔钢瓶总阀、关闭助燃气开关、关闭气路电源总开关、关闭排风装置
C. 关闭乙炔钢瓶总阀、关闭助燃气开关、关闭气路电源总开关、关闭空气压缩机并释放剩余气体、关闭排风装置
D. 关闭乙炔钢瓶总阀、关闭排风装置、关闭助燃气开关、关闭气路电源总开关、关闭空气压缩机并释放剩余气体
【单选题】
把反应 Zn +Cu2+ == Zn2+ +Cu 设计成原电池,电池符号为___。
A. (—)Zn | Zn2+|| Cu2+ | Cu(+)
B. (—)Zn2+| Zn || Cu2+ | Cu(+)
C. (—)Cu2+| Cu || Zn2+| Zn(+)
D. (—)Cu | Cu2+ || Zn2+ | Zn(+)
【单选题】
测定pH的指示电极为___。
A. 标准氢电极
B. 玻璃电极
C. 甘汞电极
D. 银氯化银电极
【单选题】
测定水中微量氟,最为合适的方法___。
A. 沉淀滴定法
B. 离子选择电极法
C. 火焰光度法
D. 发射光谱法
【单选题】
电导滴定法是根据滴定过程中由于化学反应所引起的溶液___来确定滴定终点的。
A. 电导
B. 电导率
C. 电导突变
D. 电导率变化
【单选题】
在25℃时,标准溶液与待测溶液的pH变化一个单位,电池电动势的变化为___。
A. 0.058V
B. 58V
C. 0.059V
D. 59V
【单选题】
玻璃电极在使用前一定要在水中浸泡几小时,目的在于___。
A. 清洗电极
B. 活化电极
C. 校正电极
D. 检查电极好坏
【单选题】
pH计在测定溶液的pH时,选用温度为___。
A. 25℃
B. 30℃
C. 任何温度
D. 被测溶液的温度
【单选题】
用氟离子选择电极测定溶液中氟离子含量时,主要干扰离子是___。
A. 其他卤素离子
B. NO3-离子
C. Na+离子
D. OH -离子
【单选题】
Kij称为电极的选择性系数,通常Kij越小,说明 ___。
A. 电极的选择性越高
B. 电极的选择性越低
C. 与电极选择性无关
D. 分情况而定
【单选题】
电位滴定法测定卤素时,滴定剂为AgNO3,指示电极用___。
A. 铂电极
B. 玻璃电极
C. 银电极
D. 甘汞电极
【单选题】
玻璃电极的内参比电极是___。
A. 银电极
B. 氯化银电极
C. 铂电极
D. 银-氯化银电极
【单选题】
在一定条件下,电极电位恒定的电极称为___。
A. 指示电极
B. 参比电极
C. 膜电极
D. 惰性电极
【单选题】
离子选择性电极在一段时间内不用或新电极在使用前必须进行___。
A. 活化处理
B. 用被测浓溶液浸泡
C. 在蒸馏水中浸泡24小时以上
D. 在NaF溶液中浸泡
【单选题】
下列关于离子选择性电极描述错误的是___。
A. 是一种电化学传感器
B. 由敏感膜和其他辅助部分组成
C. 在敏感膜上发生了电子转移
D. 敏感膜是关键部件,决定了选择性
【单选题】
在气相色谱法中,可用作定量的参数是___。
A. 保留时间
B. 相对保留值
C. 半峰宽
D. 峰面积
【单选题】
气相色谱仪除了载气系统、柱分离系统、进样系统外,其另外一个主要系统是___。
A. 恒温系统
B. 检测系统
C. 记录系统
D. 样品制备系统
【单选题】
影响氢焰检测器灵敏度的主要因素是___。
A. 检测器温度
B. 载气流速
C. 三种气的配比
D. 极化电压
【单选题】
气-液色谱、液-液色谱皆属于___。
A. 吸附色谱
B. 凝胶色谱
C. 分配色谱
D. 离子色谱
【单选题】
氢火焰检测器的检测依据是___。
A. 不同溶液折射率不同
B. 被测组分对紫外光的选择性吸收
C. 有机分子在氢火焰中发生电离
D. 不同气体热导系数不同
【单选题】
气液色谱法中,火焰离子化检测器___优于热导检测器。
A. 装置简单化
B. 灵敏度
C. 适用范围
D. 分离效果
【单选题】
不能评价气相色谱检测器的性能好坏的指标有___。
A. 基线噪声与漂移
B. 灵敏度与检测限
C. 检测器的线性范围
D. 检测器体积的大小
【单选题】
气相色谱标准试剂主要用于___。
A. 定性和定量的标准
B. 定性
C. 定量
D. 确定保留值
【单选题】
在气液色谱中,色谱柱使用的上限温度取决于___。
A. 试样中沸点最高组分的沸点
B. 试样中沸点最低的组分的沸点
C. 固定液的沸点
D. 固定液的最高使用温度
【单选题】
在气液色谱固定相中担体的作用是___。
A. 提供大的表面涂上固定液
B. 吸附样品
C. 分离样品
D. 脱附样品
【单选题】
对气相色谱柱分离度影响最大的是___。
A. 色谱柱柱温
B. 载气的流速
C. 柱子的长度
D. 填料粒度的大小
【单选题】
气相色谱分析中, 用于定性分析的参数是___。
A. 保留值
B. 峰面积
C. 分离度
D. 半峰宽
【单选题】
在气相色谱分析中,一般以分离度___作为相邻两峰已完全分开的标志。
A. 1
B. 0
C. 1.2
D. 1.5
【单选题】
用气相色谱柱进行分离,当两峰的分离达98%时,要求分离度至少为___。
A. 0.7
B. 0.85
C. 1
D. 1.5
【单选题】
使用热导池检测器,为提高检测器灵敏度常用载气是___。
A. 氢气
B. 氩气
C. 氮气
D. 氧气
【单选题】
在气相色谱分析中,一个特定分离的成败,在很大程度上取决于___的选择。
A. 检测器
B. 色谱柱
C. 皂膜流量计
D. 记录仪
【单选题】
在气相色谱分析流程中,载气种类的选择,主要考虑与___相适宜。
A. 检测器
B. 汽化室
C. 转子流量计
D. 记录仪
【单选题】
气相色谱分析的仪器中,载气的作用是___。
A. 载气的作用是携带样品,流经汽化室、色谱柱、检测器,以便完成对样品的分离和分析。
B. 载气的作用是与样品发生化学反应,流经汽化室、色谱柱、检测器,以便完成对样品的分离和分析
C. 载气的作用是溶解样品,流经汽化室、色谱柱、检测器,以便完成对样品的分离和分析
D. 载气的作用是吸附样品,流经汽化室、色谱柱、检测器,以便完成对样品的分离和分析
【多选题】
检验可见及紫外分光光度计波长正确性时,应分别绘制的吸收曲线是___。
A. 甲苯蒸汽
B. 苯蒸汽
C. 镨钕滤光片
D. 重铬酸钾溶液
【多选题】
分光光度法中判断出测得的吸光度有问题,可能的原因包括___。
A. 比色皿没有放正位置
B. 比色皿配套性不好
C. 比色皿毛面放于透光位置
D. 比色皿润洗不到位
【多选题】
参比溶液的种类有___。
A. 溶剂参比
B. 试剂参比
C. 试液参比
D. 褪色参比
【多选题】
原子吸收分光光度计的主要部件是___。
A. 单色器
B. 检测器
C. 高压泵
D. 光源
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用