【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
推荐试题
【单选题】
某急性广泛前壁心肌梗死患者,发病6小时之内应首选下列哪项治疗___
A. 口服疏甲丙脯酸
B. 口服美托洛尔
C. 静脉注射西地兰
D. 尿激酶溶栓治疗
E. 静脉滴注低分子右旋糖苷
【单选题】
左心功能不全失代偿的早期依据是___
A. 心动过速
B. 心脏扩大
C. 心肌肥厚
D. 夜尿增多
E. 劳力性呼吸困难
【单选题】
急性心肌梗死患者若无并发症,卧床休息多少时间___
A. 12小时
B. 24小时
C. 48小时
D. 72小时
E. 1周
【单选题】
奇脉见于下列哪种疾病___
A. 肺源性心脏病
B. 心包积液
C. 冠心病
D. 缩窄性心包炎
E. 心肌病
【单选题】
某急性心肌梗死患者突然出现心尖区收缩期杂音,无震颤,心力衰竭明显加重。最可能的原因是___
A. 左室扩大,引起二尖辫关闭不全
B. 心率增快
C. 合并亚急性细菌性心内膜炎
D. 室间隔穿孔
E. 乳头肌功能失调或断裂
【单选题】
某急性心肌梗死的患者两小时后心电图随访Ⅱ.Ⅲ.avF导联出现病理性Q波,提示心肌梗死的部位可能是___
A. 后壁
B. 前壁
C. 下壁
D. 右侧壁
E. 左侧壁
【单选题】
长期卧床的心力衰竭患者栓子可来自下肢静脉,最易导致___
A. 上肢栓塞
B. 脑栓塞
C. 脾栓塞
D. 肺栓塞
E. 肾栓塞
【单选题】
频发室性早搏是指每分钟发生室性早搏多于___
A. 1次
B. 5次
C. 10次
D. 20次
E. 30次
【单选题】
动脉粥样硬化最具有特征性的病变是___
A. 纤维斑块病变引起管腔狭窄
B. 局限于动脉内膜的脂质条纹病变
C. 纤维斑块发生出血.坏死.溃疡的复合病变
D. 血管内膜表面破溃形成血栓及机化
E. 动脉壁的弹力层和肌层破坏后血管破裂引起出血
【单选题】
患者,男性,60岁,因急剧胸痛8小时入院,含服硝酸甘油效果不佳,血压为22.3/12.5kPa(168/94mmHg),心率为110次/分,伴偶发室性早搏,心电图示胸导联T波高尖。宜首选下列哪项治疗___
A. 静脉注射美托洛尔,继以口服
B. 口服异山梨酯
C. 静脉注射利多卡因
D. 口服慢心律
E. 口服疏甲丙脯酸
【单选题】
患者,女,28岁,首次入院,入院后一直在病房中走来走去,并主诉睡眠和胃口不佳。此患者的表现属于下列哪一种反应___
A. 焦虑
B. 恐惧
C. 害羞
D. 抑郁
E. 猜疑
【单选题】
关于对角色的有关陈述错误的是___
A. 原为戏剧.电影中的术语
B. 角色行为由个体完成
C. 社会心理学的一个专业术语
D. 角色行为由团体完成
E. 角色之间相互依存
【单选题】
护士语言使用要准确,言能达意,交代护理意图要简洁.通俗,避免使用医学术语,体现了语言的___
A. 专业性
B. 道德性
C. 礼貌性
D. 规范性
E. 安慰性
【单选题】
信息交流中最重要的技巧是___
A. 核实情况
B. 沉默的运用
C. 触摸的方式
D. 同情的表示
E. 用心倾听
【单选题】
护士与一糖尿病的患者及家属共同研究和讨论患者出院后的饮食安排问题,此时其最主要的角色是___
A. 治疗者
B. 管理者
C. 照顾者
D. 教导者
E. 协调者
【单选题】
患者不承认自己患病,称为___
A. 角色行为缺如
B. 角色行为强化
C. 角色行为消退
D. 角色行为冲突
E. 角色行为矛盾
【单选题】
护士能对日常的护理工作进行合理的组织.协调和控制,其角色与功能为___
A. 健康教育者
B. 健康协调者
C. 护理管理者
D. 护理计划者
E. 患者代言人
【单选题】
患者一方面需要别人的关心.照顾,另一方面又认为别人的关心照顾意味着自己的无能这属于患者一般心理反应的哪一种___
A. 焦虑
B. 无价值感与孤独感
C. 自尊心增强
D. 不安与挫折感
E. 主管感觉异常
【单选题】
以下哪一项社会特征不影响患者角色的适应___
A. 年龄
B. 文化程度
C. 家庭经济状况
D. 籍贯
E. 生活习惯
【单选题】
持治疗盘的姿态为双手握托治疗盘,肘关节贴近躯干呈___
A. 45°
B. 60°
C. 90°
D. 105°
E. 120°
【单选题】
患者,女,36岁,因乳腺癌住院,准备手术治疗,常暗自流泪.沉思,焦虑万分,护理时哪项是最重要的工作___
A. 通知家属来院探望
B. 允许陪住,避免焦虑
C. 报告主管医生前来诊治
D. 鼓励患者倾诉,给予疏导和安慰
E. 给予镇静剂缓解症状
【单选题】
在护患交往过程中,除以下哪种患者以外都可使用共同参与护理活动的模式___
A. 产妇
B. 糖尿病患者
C. 术后患者
D. 新生儿
E. 肢体训练患者
【单选题】
一人外伤后出血.烦躁,肢端湿冷,脉搏105次/分,脉压低。应考虑___
A. 无休克
B. 休克早期
C. 休克中期
D. 休克晚期
E. DIC形成
【单选题】
抗休克首要而基本的措施是___
A. 扩充血容量
B. 消除病因
C. 防止肾衰竭
D. 纠正酸中毒
E. 纠正电解质紊乱
【单选题】
抗休克治疗时,对改善肾缺血是哪一种药物___
A. 去甲肾上腺素
B. 肾上腺素
C. 多巴胺
D. 麻黄碱(麻黄素)
E. 去氧肾上腺素(新福林)
【单选题】
休克患者扩容首选的溶液是___
A. 平衡液
B. 生理盐水
C. 全血
D. 5%葡萄糖液
E. 右旋糖酐40(低分子右旋糖酐
【单选题】
患者男性,50岁,患胃十二指肠溃疡,突然大量呕血600ml左右,并出现烦躁不安.面色苍白.四肢湿冷。脉搏108次/分,血压14/12kPa。考虑患者已发生___
A. 虚脱
B. 轻度休克
C. 中度休克
D. 重度休克
E. 尚未休克
【单选题】
休克时患者的体位应处于___
A. 中凹位
B. 头低足高位
C. 平卧位
D. 半坐卧位
E. 头高足低位
【单选题】
患者男性,36岁,左下胸受挤压,左8.9.10肋骨骨折,脾破裂。面色苍白.四肢湿冷,脉搏122次/分,血压10.6/8kPa(80/60mmHg)。正确的处理原则是___
A. 大量快速输液待血压正常后手术
B. 一旦确诊立即手术
C. 积极抗休克,如病情无好转再手术
D. 积极抗休克同时迅速手术
E. 快速大量输血,待病情稳定后手术
【单选题】
观察休克患者血管痉挛严重程度的主要依据是___
A. 呼吸深浅
B. 意识情况
C. 脉压大小
D. 脉搏快慢
E. 肢端温度
【单选题】
在下列抗休克措施中,错误的是___
A. 吸氧.静脉输液
B. 平卧位
C. 置热水袋加温
D. 测中心静脉压
E. 观测尿量
【单选题】
内脏器官的损害一般在休克发生多长时间出现___
A. >16小时
B. >8小时
C. >10小时
D. >12小时
E. >24小时
【单选题】
上消化道大出血患者错误的护理措施是___
A. 平卧位.头偏向一侧
B. 严密观察出血量和色
C. 尽量鼓励患者起床排便
D. 绝对卧床
E. 大量呕血者须暂禁食
【单选题】
诊断早期原发性肝癌最有价值的方法是___
A. γ-GT
B. AFP的动态观察
C. CEA
D. CT
E. MRI
【单选题】
给上消化道出血患者做胃镜检查的适宜时间是___
A. 出血后24~48小时内
B. 出血后72小时内
C. 出血停止后10天
D. 出血停止后1周内
E. 出血停止后2周内
【单选题】
对消化系统疾病患者的护理,不正确的是___
A. 腹胀时可肛门排气
B. 消化道出血后不宜立即灌肠
C. 便秘时多吃水果
D. 腹泻时可服高蛋白高脂饮食
E. 做好口腔护理
【单选题】
确诊慢性胃炎的主要检查方法为___
A. 胃镜
B. X线
C. 胃液分析
D. 血清Hp抗体
E. 大便隐血试验
【单选题】
成人每天分泌的小肠液量为___
A. 100~200ml
B. 300~400ml
C. 500~600ml
D. 1000~3000ml
E. 4000~5000ml
【单选题】
护理肝性脑病患者,最为关键的措施是___
A. 注意休息
B. 避免诱因
C. 加强安全
D. 观察病情变化
E. 用药指导
【单选题】
急性胰腺炎患者的主要临床表现是___
A. 发热
B. 腹痛
C. 腹泻
D. 呕吐
E. 休克