【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
推荐试题
【单选题】
《化学品安全技术说明书编写规定》适用于___。
A. 民用受控消费品
B. 工业化学品
C. 以科学研究为目的的少量样品
【单选题】
储存的危险化学品应有符合国家标准要求的明显标志,同一区域储存两种或两种以上不同级别的危险品时,应按___等级危险物品的性能标志。
【单选题】
根据《工伤保险条例》,职工在工作时间和工作场所内,因工作原因受到事故伤害的,___认定为工伤。
【单选题】
国务院及有关部门为应对某一类型或某几种类型突发公共事件而制定的应急预案叫突发公共事件___应急预案。
【单选题】
风险评价是对系统存在的危险进行定性或定量的分析,得出系统发生危险的可能性及其后果___程度的评价。
【单选题】
根据事故情景,应急处置结束后,所开展的事故损失评估.事故原因调查.事故现场清理和相关善后工作就是___。
【单选题】
在应急救援过程中,为了更好地维护危险区及其附近地区的___,还应及时利用通告.广播等形式将事故的有关情况及处置措施向群众通报,通过宣传教育,稳定群众情绪,严防由于群众恐慌或各种谣传引起社会混乱。
【单选题】
《危险化学品经营企业开业条件和技术要求》规定,库存危险化学品应根据其化学性质分区.分类.分库储存,___不能混存。灭火方法不同的危险化学品不能同库储存。
【单选题】
我国的职业病防治工作原则是:“分类管理.___治理”。
【单选题】
发生危险化学品事故,事故单位___应当立即按照本单位危险化学品应急预案组织救援。
A. 主要负责人
B. 安全生产管理人员
C. 安全管理负责人
【单选题】
如果触电者伤势严重,呼吸停止或心脏停止跳动,应竭力施行___和胸外心脏按压。
【单选题】
乙炔瓶的定期检验,每三年进行一次,库存或停用周期超过___年的乙炔瓶,启用前应进行检验。
【单选题】
在不大于规定充装量的条件下,液化石油气储罐的压力随___变化而变化。
A. 储存温度
B. 充装量
C. 输送设备的压力
【单选题】
劳动者离开用人单位时,有权索取本人职业健康监护档案复印件,用人单位应当如实.无偿提供,并在所提供的复印件上___。
【单选题】
在炸药中掺入少量炭黑.石墨.硼粉等导电物质,以降低炸药的___,减少静电的积聚。
【单选题】
易燃品闪点在28℃以下,气温高于28℃时应当在___运输。
【单选题】
如果可燃气体在泄漏的同时被点燃,将会在泄漏处发生 ___。
【单选题】
根据《常用化学危险品贮存通则》规定,下列贮存方式不属于危险化学品贮存方式的是___贮存。
【单选题】
危险化学品存在的主要危险是___。
A. 火灾.爆炸.中毒.腐蚀及污染环境
B. 火灾.爆炸.中毒.灼伤及污染环境
C. 火灾.爆炸.感染.腐蚀及污染环境
【单选题】
我国包装代码标准与联合国标准基本相同,用___表示容器的种类。
【单选题】
国家标准《安全色》中规定,对比色使安全色更加醒目的反衬色,包括___两种颜色。
【单选题】
特种设备在投入使用前或者投入使用后___日内,特种设备使用单位应当向直辖市或者设区的市的特种设备安全监督管理部门登记。
【单选题】
压缩气体和液化气体必须与爆炸物品.氧化剂.易燃物品.自燃物品.腐蚀性物品___储存。
【单选题】
危险化学品经营单位经营方式发生变化的,应当___办理经营许可证。
【单选题】
根据《工伤保险条例》,职工在工作时间和工作场所内,因履行工作职责受到暴力等意外伤害,但本人醉酒的,___认定为工伤。
【单选题】
化学品使用单位,应向___索取全套的最新的化学品安全技术说明书。
A. 安全生产许可证发证机关
B. 生产商
C. 供应商
【单选题】
安全检查是指对生产过程及安全管理中可能存在的事故隐患.危险与有害因素.安全缺陷等进行___。
【单选题】
企业应根椐重大危险源目标模拟事故___,制订出各种状态的应急处置方案。
【单选题】
应急救援过程中,救援人员在做好自身防护的基础上,应快速___,控制事故发展。
【单选题】
事故隐患分为一般事故隐患和___事故隐患。
【单选题】
没有建立专职应急救援队的危险化学品企业必须与邻近的具备相应能力的专业救援队签订应急___。
【单选题】
危险化学品单位应当将其危险化学品事故应急预案报所在地设区的___级人民政府安全生产监督管理部门备案。
【单选题】
《危险化学品安全管理条例》规定,国家对危险化学品经营实行___制度。
【单选题】
《危险化学品安全管理条例》规定,危险化学品单位的___对本单位的危险化学品安全管理工作全面负责。
A. 主要负责人
B. 安全管理人员
C. 安全负责人
【单选题】
屏护装置把___同外界隔离开来,防止人体触及或接近。
【单选题】
《气瓶安全监察规程》规定,车用液化石油气钢瓶,每___年检验一次。
【单选题】
《气瓶安全监察规程》规定,气瓶充装登记有效期为___年。