【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
推荐试题
【单选题】
KCC是指___
A. 重要控制特性
B. 重要产品体系
C. 关键控制特性
D. 关键产品特性
【单选题】
某轴的外圆直径为10(0/+0.025),请选择以下哪一种量具测量最合适___
A. 0-150数显游标卡尺
B. 0-25千分尺
C. 0-25数显千分尺
D. 三坐标
【单选题】
新项目提交PPAP前要进行初始过程能力研究,过程能力值要达到___
【单选题】
在测量系统分析时,“由一个评价人,采用一种测量仪器,多次测量同一零件的同一特性时获得的测量值变差”是指测量系统的哪一项统计特性___
【单选题】
我们经常说一制造过程处于受控状态,处于受控状态过程的影响因素是___
A. 异常原因
B. 设备原因
C. 普通原因
D. 无任何原因
【单选题】
以下哪个不是花键量具___
A. 通规
B. 止规
C. 综合量规
D. 游标卡尺
【单选题】
SDS目前使用的二氧化碳激光焊机,使用以下什么气体作为焊接保护气___
A. 高纯氦气
B. 高纯二氧化碳
C. 90%的高纯氦气+10%的高纯氩气的混合气
D. 高纯氮气
【单选题】
定制内花键拉刀时,应选用___
A. 最大实际齿槽宽。
B. 最大作用齿槽宽
C. 小实际齿槽宽。
D. 最小作用齿槽宽
【单选题】
搓花键中如发现花键大径超上差,一般用什么方法来解决___
A. 增大搓齿板间距
B. 减小搓齿板间距
C. 减小花键的预车直径
D. 修搓赤板
【单选题】
球道硬铣的理想铣削余量是___
A. 理想铣削余量在直径方向小于等于0.10mm.
B. 理想铣削余量在直径方向小于等于0.20mm.
C. 理想铣削余量在直径方向小于等于0.30mm.
D. 理想铣削余量在直径方向小于等于0.40mm.
【单选题】
球道硬铣刀如遇水迹、油迹时会有什么后果___
A. 使硬铣刀的寿命减少
B. 工件加工表面烧蚀
C. 工件尺寸超差
D. 工件加工表面硬度低
【单选题】
,则砂轮的表面线速度为___"
A. 40m/s
B. 40mm/s
C. 60m/s
D. 60m/min
【单选题】
校直机校直时的定位方式是___
A. 两个工件托架
B. 头架及尾架顶针
C. 一个工件托架,一个尾架顶针
D. 卡盘+尾架顶针
【单选题】
以下哪种加工方式能得到最小的表面粗糙度数值___
【单选题】
以下哪种方式不属于无切削加工___
A. 刮削
B. 抛光
C. 摩擦焊
D. 滚螺纹
【单选题】
以下四种材料中,哪种含碳量最高___
A. GCr15
B. 7Cr17
C. 38CrMoAL
D. 38B3
【单选题】
为什么大多数夹具都需要进行表面氧化处理(俗称发黑)___
A. 防锈
B. 车间现场5S的需求
C. SDS内部标准之一
D. 增加夹具的表面硬度
【单选题】
含碳量为0.77%的碳钢是___
A. 亚共析钢
B. 共析钢
C. 过共析钢
D. 包晶钢
【单选题】
板条马氏体又称___
A. 低碳马氏体
B. 中碳马氏体
C. 高碳马氏体
D. 贝氏体
【单选题】
亚共析钢的淬火是___
A. 将钢加热到AC3+30~50℃保温后空冷或风冷
B. 将钢加热到AC3+30~50℃保温后水冷
C. 将钢加热到AC3+30~50℃保温后炉冷
D. 将钢加热到AC3+30~50℃保温后再加热
【单选题】
当执行制造过程的____均由机械(机器)来完成,则可以认为这个制造过程是“自动化”了。___
A. 基本动作
B. 控制动作
C. 基本动作及其控制机构的动作
D. 辅助动作
【单选题】
机器人手部的位置由哪两部分变量构成___
A. 位置和速度
B. 姿态和位置
C. 位置和运行状态
D. 姿态和速度
【单选题】
_____是零件整个机械加工工艺过程自动化的基本问题之一,是实现零件加工自动化的基础___
A. 物流供输的自动化
B. 加工设备的自动化
C. 刀具的自动化
D. 检测过程的自动化
【单选题】
为了取得良好的效果,应当在____工艺基础上实现机床自动化___
A. 先进的
B. 相对落后的
C. 固定的
D. 老旧的
【单选题】
只有实现了加工过程自动化,并且有____能力的设备,才能称为自动化加工设备___
A. 自动检测
B. 自动装配
C. 自动监控
D. 自动装卸
【单选题】
刚性自动化生产线是用工件输送系统将各种自动化加工设备和辅助设备按一定的顺序连接起来,在控制系统的作用下完成____零件加工的复杂大系统。___
【单选题】
从系统的观点来看,一般地机械制造自动化系统主要由____等部分所构成。 ___
A. 加工系统和工件支撑系统
B. 加工系统、刀具支撑系统和工件支撑系统
C. 加工系统和刀具支撑系统
D. 加工系统、工件支撑系统、刀具支撑系统和控制与管理系统
【单选题】
金属材料在外力作用下,抵抗断裂的能力叫___
A. 抗弯强度
B. 屈服强度
C. 强度极限
D. 疲劳极限
【单选题】
碳钢中含磷量过高时,容易引起钢_______
【单选题】
影响刀具的锋利程度、减少切屑变形、减小切削力的刀具角度是___
A. 主偏角
B. 前角
C. 后角
D. 刃倾角
【单选题】
闭环控制的伺服系统,三个关键环由外至内分别为___
A. 位置环、速度环、电流环
B. 速度环、位置环、电流环
C. 位置环、电流环、速度环
D. 速度环、电流环、位置环
【单选题】
数控机床的位置精度的主要指标有___
A. 分辨率和脉冲当量
B. 几何精度
C. 定位精度和重复定位精度
D. 主轴回转精度
【单选题】
通常,切削温度随着切削速度的提高而增高。当切削速度增高到一定程度后,切削温度将随着切削速度的进一步升高而___
A. 开始降低
B. 继续升高
C. 恒定不变
D. 开始降低并趋于平缓
【单选题】
为了保证小孔钻削加工的质量,关键是要解决钻孔过程中的___
A. 排屑和冷却
B. 冷却和润滑
C. 排屑和润滑
D. 转速控制
【单选题】
数控设备伺服轴的螺距补偿可以通过____测量出来___
A. 百分表
B. 千分表
C. 激光干涉仪
D. 数显游标卡尺
【单选题】
通过机床的挡块或行程开关决定的坐标位置叫___
A. 机床原点
B. 机床参考点
C. 机床换刀点
D. 刀架参考点
【单选题】
数控装置中电池的作用是___
A. 给系统的CPU运算提供能量
B. 在系统断电时,用来保持RAM中的数据
C. 为检测元件提供能量
D. 在突然断电时为数控机床提供动能,使机床能暂时运行几分钟,以便退出刀具
【单选题】
以下属于液压系统控制元件的是___
A. 液压泵
B. 液压缸
C. 换向阀
D. 电动机
【单选题】
提供中央连接点,用于在局域网中连接多台PC或者多个网段而又比集线器复杂的网络设备叫___
A. 交换机
B. 路由器
C. 调制解调器
D. 网络适配器
【单选题】
金属抵抗永久变形和断裂的能力是其___
A. 韧性
B. 硬度
C. 疲劳强度
D. 强度和塑性