刷题
导入试题
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
推荐试题
【填空题】
33 在成本管理信息___系统中,责任成本计价中合同内明细表中本季完成数量优先默认等于参考数量中的 【 验工数量 】 ,且可以修改。
【填空题】
34 在成本管理信息___系统中,清单分解审批可以发起 【多 】次。
【填空题】
35 在成本管理信息___系统中,总控数量变更可以发起 【 多】 次。
【填空题】
36 在成本管理信息___系统中,由于某单价合同签订时工程量小,单价确定的较高,但是实际施工时由于变更引起量增加较多,需进行对原合同细目单价进行调减,在发起劳务合同变更流程后,可通过 【勾选已结算数量是否补差】 来实现。
【填空题】
37 在成本管理信息___系统中,项目在发起机械结算时的前置流程为【单机油料核算】,在单机油料核算中无扣款,复选框是指当该合同没有油料扣款时才勾选。
【填空题】
38 在成本管理信息___系统中,现场经费全周期预算表中的预算现场经费总额取自经审批的【责任成本预算编制的现场经费总额】。
【填空题】
39 在成本管理信息___系统中,各公司 【系统管理员】 可以通过文档管理模板模块,上传本公司的合同文本,供项目使用。
【填空题】
40 在成本管理信息___系统中,三项指标计算分析表中的实际产值的数据来源取自 【验工计价分析汇总表中的实际产值 】。
【填空题】
填空___
【填空题】
2 根据《铁路建设项目变更设计管理办法》___规定,铁路项目巳签合同中非责任事故、问题的 II 类变更设计,增减工程费用在300 万元以内的,纳入风险包干费;增减工程费用在 300 万元及以上的,由建设单位在【基本预备费】找那个列支并相应调整施工合同额。
【填空题】
3 根据《铁路建设项目变更设计管理办法》___规定,变更索赔是工程项目增盈减亏的重要手段,是企业实现效益的重要途径,应在确保质量、安全、工期和环保的前提下,围绕效益最大化的目标进行,应始终贯穿于【企业生产经营管理】的全过程。
【填空题】
5 中铁股份成本〔2018〕61 号文,施工图招标铁路项目投资控制程序为:可研批复投资估算___→初步设计概算→鉴修概算→【施工图预算】→分标预算___→投标合同清单→概算清理→审价→办理末次计价。
【填空题】
8 根据铁建设〔2013〕99 号文《中国铁路总公司关于铁路工程推广应用高强钢筋有关工作的通知》,自通知颁布之日___起,在建暂未施工的项目,原设计的HRB35 钢筋,应用 HRB400 钢筋代替,增加的相关费用按【变更】办理。
【填空题】
11 《中国中铁工程项目变更索赔指导意见》___,项目经理部的工经部是项目变更索赔工作的【牵头管理】部门。
【填空题】
12 《中国中铁工程项目变更索赔指导意见》___,各层级要贯彻落实变更索赔“【八要八不要】”工作思路和“六要”工作方法,建立有计划、切实可行的目标管理制度。
【填空题】
13 《中国中铁工程项目变更索赔指导意见》___,要把【二次经营】指标纳入生产经营考核指标体系,增强二次经营工作的严肃性,促进各级切实提高抓好这项工作的自觉性。
【填空题】
14 《中国中铁工程项目变更索赔指导意见》___,明确项目经理部【每月】至少要召开一次变更索赔___管理分析会。
【填空题】
15 《中国中铁工程项目变更索赔指导意见》___,明确在单项变更索赔批复计价后、项目整体完工后,应对各项变更索赔进行【专项评价】,总结经验、查找得失、指导后续变更索赔工作。
【填空题】
16 《中国中铁工程项目变更索赔指导意见》___,文明确变更索赔工作应强化法制意识和风险防范意思, 确保经得起审计、【财政审查】和各类执法检查;应强化风险控制,杜绝隐患,并做好反索赔相关工作。
【填空题】
17 《中国中铁工程项目变更索赔指导意见》___,明确在项目开工【一个月内】,项目经理部应成立变更索赔工作小组,明确分工,责任到人;项目经理为变更索赔管理的第一负责人,全面负责变更索赔工作。
【填空题】
18 《中国中铁工程项目变更索赔指导意见》___,根据工程项目变更设计管理流程,提出并编制变更设计建议书由【项目工程部长】负责提出。
【填空题】
19 《中国中铁工程项目变更索赔指导意见》___,变更索赔是工程项目增盈减亏的重要手段,是企业实现效益的重要途径,应在确保【质量】、【安全】、【工期】和【环保】的前提下,围绕利益最大化的目标进行,应始终贯穿于企业生产经营管理的全过程。
【填空题】
20 《中国中铁工程项目变更索赔指导意见》___,【成本】与【采购管理部】是股份公司变更索赔工作的主责部门,主要负责全系统变更索赔工作的日常管理。
【填空题】
21 《中国中铁工程项目变更索赔指导意见》___,【经营开发部】主要负责前期经营策划,在一次经营的基础上,为中标后的变更索赔埋下伏笔;负责就股份公司直属工程项目向成本与【采购管理部】进行营销交底。
【填空题】
22 《中国中铁工程项目变更索赔指导意见》___,铁路工程项目变更索赔额指【合同内】优化、【风险包】干费___及【合同外】收入之和,其中负变更金额按绝对值计列。
【填空题】
23 《中国中铁工程项目变更索赔指导意见》___,股份公司每年、二级公司【半年】、三级公司【每季度】、项目经理部每月至少要召开一次变更索赔管理分析会。
【填空题】
24 中铁四成本___717 号文明确,特殊变更事项是指负变更设计实现项目减亏、【工程数量负量差的消化】、PPP项目设计方案优化节约等内容。
【填空题】
25 中铁四成本___717 号文明确,项目收尾结算阶段,【局指负责人】是第一责任人。
【填空题】
26 中铁四成本___717 号文明确,项目准备阶段。项目合同开工日期后【3】个月内,局指组织参建单位,分析合同、结合实际、研究策略,制订变更索赔策划方案,录入成本管理信息系统审批。
【填空题】
27 中铁四成本___717 号文明确,变更索赔奖励以实现【变更索赔利润率】为考核指标,按实现的变更索赔利润额为奖励计取基数。
【填空题】
28 中铁四成本___717 号文明确,项目竣工结算完成后,依据局审计部认定的实际利润,遵照【细分管理、精准控制】等项目成本管理六大理念,由局指配合局成本管理部区分“三项指标”对项目利润贡献大小,并配合局相关部门综合评价,评价结果与项目考核兑现挂钩。
【填空题】
33 根据《铁路建设项目变更设计管理办法》___规定,建设单位应对I类变更设计文件进行初审,涉及环水保的重大问题的变更设计,应先向【总公司环保水保】主管部门报告,经同意后,再形成初审意见连同I类变更设计文件一并报送总公司
【填空题】
34 根据《铁路建设项目变更设计管理办法》___规定,包干外II类变更设计由建设单位组织审定,费用在【预备费】中列支。
【填空题】
35 根据《铁路建设项目变更设计管理办法》___规定,铁路项目涉及【安全】的II类变更设计,建设单位应在现场组织确定变更设计方案,按确定的方案先进行施工准备和应急处理。
【填空题】
36 根据《铁路建设项目变更设计管理办法》___规定,非责任原因引起的I类变更设计,勘察设计费按变更设计批复支付;责任原因引起的I类变更设计,勘察设计费由【责任】单位承担。
【填空题】
37 根据《铁路建设项目变更设计管理办法》___规定,改沟改河改渠工程,超出合同清单数量的,要办理【包干外II类变更设计】,由业主承担或纳入清概。
【单选题】
6月30日,中央组织部最新党内统计数据显示,截至2018年底,中国共产党党员总量___,突破9000万。
A. 9029.4万
B. 9039.4万
C. 9049.4万
D. 9059.4万
【单选题】
2019年7月1日,敬斐颂巧克力(上海)有限公司领取了首张经营场所冠以“长三角生态___发展示范区”字样的营业执照和食品经营许可证。此次证件还属于跨区域“证照联办”机制的尝试。
A. 绿色一体化
B. 产业一体化
C. 经济一体化
D. 企业联合一体化
【单选题】
2019年7月1日上午,海口市全国第一例___”市郊列车是海南省首条投入运营的快速 城市轨道交通线路。
A. 高铁信息化
B. 高铁便民化
C. 高铁绿色化
D. 高铁公交化
【单选题】
2019年7月1日,近期,中国科学院合肥智能机械研究所设计制备出一种高效的比色荧光纳 米探针,用其制成荧光试纸 ,根据试纸颜色变化即可对水中的___含量快速形成初步判断 。
A. 铅离子
B. 纳离子
C. 氢离子
D. 氧离子
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用