刷题
导入试题
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
推荐试题
【单选题】
采用平行结转分步法时,完工产品与在产品之间费用的分配是___。
A. 各生产步骤完工半成品与月末加工中在产品之间费用的分配
B. 各步骤产成品与各步骤在产品之间费用的分配
C. 产成品与月末各步骤尚未加工完成的在产品和各步骤已完工但尚未最终完成的产品之间的费用分配
D. 产成品与月末加工中在产品之间的费用分配
【单选题】
多步骤生产划分为___。
A. 大量式和大批式生产
B. 平行式和连续式生产
C. 简单生产和复杂生产
D. 成批生产和单件生产
【单选题】
逐步结转分步法,在产品是指___。
A. 广义在产品
B. 狭义在产品
C. 各步骤自制半成品
D. 各步骤在产品和半成品
【单选题】
成本还原是从___开始。
A. 第一步骤
B. 最后步骤
C. 上一步骤
D. 产成品
【单选题】
逐步结转分步法实际上是___.的多次连接应用。
A. 品种法
B. 分批法
C. 分类法
D. 分步法
【单选题】
采用逐步结转分步法,半成品通过半成品库收发,在完工半成品入库时,应借记___.,贷记“基本生产成本”账户。
A. “在产品”
B. “库存商品”
C. “自制半成品”
D. “制造费用”
【单选题】
生产过程中发现的或入库后发现的各种产品的废品损失,应包括___。
A. 不可修复废品报废损失    
B. 废品过失人员赔偿款      
C. 实行“三包”损失
D. 管理不善损坏变质损失
【单选题】
因保管不善.运输不当或其他原因使合格品损坏变质带来的损失不应计入废品损失,而应计入___
A. 管理费用
B. 制造费用
C. 营业外支出
D. 生产成本
【单选题】
季节性修理期间的停工损失应该计入___。
A. 废品损失
B. 管理费用
C. 制造费用
D. 营业外支出
【单选题】
定额法下计算的产品成本是___。
A. 定额成本
B. 实际成本
C. 计划成本
D. 标准成本
【单选题】
废品净损失应由___。
A. 同种合格产品成本负担
B. 营业成本负担
C. 营业外支出负担
D. 税后利润负担
【单选题】
机器设备大修理期间的停工损失,列作___。
A. 制造费用
B. 营业费用
C. 管理费用
D. 待摊费用
【单选题】
废品损失不包括___。
A. 修复废品人员工资
B. 修复废品使用材料
C. 不可修复废品的报废损失
D. 产品“三包”损失
【单选题】
废品净损失分配转出时,应借记___科目。
A. “废品损失”
B. “生产成本”
C. “管理费用”
D. “制造费用”
【单选题】
由于自然灾害造成的非正常停工损失,应计入___。
A. 营业外收入
B. 营业外支出
C. 管理费用
D. 制造费用
【单选题】
计算出来的废品损失应___。
A. 分配计入当月同种合格品的成本中
B. 分配计入当月各种合格品的成本中
C. 直接计入当月的“制造费用”科目中
D. 直接计入当月的“管理费用”科目中
【单选题】
计算出来的废品损失,应分配转由___。
A. 本月的制造费用负担
B. 本月的管理费用负担
C. 本月的同种产品成本负担
D. 下月的同种产品成本负担
【单选题】
企业在核算废品损失时,一般是指___。
A. 辅助生产车间的废品损失
B. 基本生产车间的废品损失
C. 基本生产车间和辅助生产车间发生的废品损失
D. 产品销售后发生的废品损失
【单选题】
不可修复废品损失的核算,应采用一定的方法,将废品的成本计算出来,然后,从“生产成本”科目的贷方转入借方的会计科目是___。
A. “制造费用”科目
B. “管理费用”科目
C. “废品损失”科目
D. “营业外支出”科目
【单选题】
工业企业的废品损失应计入___。
A. 管理费用
B. 销售费用
C. 生产成本
D. 营业外支出
【单选题】
各辅助生产费用分配法中,需要制定计划单价的方法是___。
A. 代数分配法
B. 一次交互分配法
C. 计划成本分配法
D. 直接分配法
【单选题】
提供水电汽的辅助生产单位,在各收益对象之间分配的辅助生产费用,是指该生产单位___。
A. 本期发生的费用
B. 期初在产品成本
C. 期末在产品成本
D. 生产费用合计数
【单选题】
在下列各种分配方法当中,属于辅助生产费用分配方法的是___。
A. 约当产量法
B. 按计划成本分配法
C. 按定额成本分配法
D. 生产工时比例分配法
【单选题】
采用直接分配法分配辅助生产费用时,各辅助生产车间费用分配率计算公式中的分母数应是___。
A. 该辅助生产车间向基本生产车间提供的劳务总量
B. 该辅助生产车间向行政管理部门提供的劳务总量
C. 该辅助辅助生产车间提供的劳务总量
D. 该辅助生产车间向基本生产车间和行政管理部门提供的劳务总量
【单选题】
采用一次交互分配法分配辅助生产费用时,计算第二阶段直接分配率的分子数应是___。
A. 该辅助生产车间直接发生的费用
B. 该辅助生产车间直接发生的费用加上分配转入的费用
C. 该辅助生产车间直接发生的费用加上分配转入减去分配转出的费用
D. 该辅助生产车间直接发生的费用减去分配转出的费用
【单选题】
采用顺序分配法分配辅助生产费用时,计算辅助生产车间费用分配率的分子数字应是___。
A. 该辅助生产车间直接发生的费用
B. 该辅助生产车间直接发生的费用加上分配转入的费用
C. 该辅助生产车间直接发生的费用加上分配转入减去分配转出的费用
D. 该辅助生产车间直接发生的费用减去分配转出的费用
【单选题】
采用计划成本分配法分配辅助生产费用时,实际成本与按计划成本分配额的差额应于期末时列入___。
A. 制造费用
B. 管理费用
C. 财务费用
D. 生产成本
【单选题】
采用计划成本分配法分配辅助生产费用时,辅助生产费用分配表中辅助生产实际成本___。
A. 是正确的实际成本
B. 不是“纯碎”的实际成本
C. 是正确的计划成本
D. 是辅助生产车间本身的费用,不包括上一步骤转入的费用
【单选题】
原材料脱离定额差异实质上是___。
A. 原材料数量差异
B. 原材料成本差异
C. 价格差异
D. 定额变动差异
【单选题】
采用交互分配法分配辅助生产费用时,第二阶段的对外分配应___。
A. 在辅助生产车间以外的各受益单位之间进行分配
B. 在辅助生产车间以内的各受益单位之间进行分配
C. 在辅助生产车间.部门之间进行分配
D. 只分配给基本生产车间
【单选题】
在辅助生产费用的各种分配方法当中,最简便的方法是___。
A. 顺序分配法
B. 直接分配法
C. 交互分配法
D. 代数分配法
【单选题】
辅助生产的直接分配法一般是将辅助生产车间发生的费用___。
A. 直接记入辅助生产车间明细帐
B. 直接记入“辅助生产成本”明细帐
C. 直接分配给所有受益单位
D. 直接分配给辅助生产以外的各受益单位
【单选题】
采用顺序分配法分配辅助生产费用时,其分配的顺序是___。
A. 先辅助生产车间后基本生产车间
B. 先辅助生产车间内部后对外部单位
C. 辅助生产车间受益金额多少
D. 辅助生产车间提供劳务金额的多少
【单选题】
采用辅助生产费用的交互分配法,对外分配的费用总额是___。
A. 交互分配前的费用     
B. 交互分配前的费用加上交互分配转入的费用
C. 交互分配前费用减去交互分配转出的费用
D. 交互分配前的费用再加上交互分配转入的费用,减去交互分配转出的费用
【单选题】
基本生产成本明细账按___设置栏目。
A. 各项费用
B. 费用项目
C. 成本项目
D. 按品种
【单选题】
原材料在生产开工时一次投入,月末在产品20件,计算分配材料月末在产品约当产量是___。
A. 15件
B. 10件
C. 5件
D. 20件
【单选题】
在各辅助生产车间相互提供劳务很少的情况下,适宜采用的辅助生产费用分配方法是___。
A. 直接分配法    
B. 交互分配法     
C. 计划成本分配法     
D. 代数分配法
【单选题】
“制造费用”明细账,应当按照___设置。
A. 不同生产单位(分厂.车间)
B. 不同费用项目
C. 不同产品品种
D. 不同成本核算对象
【单选题】
“制造费用”账户___。
A. 期末余额在贷方
B. 不应当有期末余额
C. 除季节性生产企业外,期末应无余额
D. 除季节性生产企业外,期末有借方余额
【单选题】
除了按年度计划分配率分配制造费用外,“制造费用”账户月末___。
A. 没有余额
B. 一定有借方余额
C. 一定有贷方余额
D. 有借方或贷方余额
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用