刷题
导入试题
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
推荐试题
【判断题】
(1)Pharmacodynamics, which is concerned with the study of the biochemical and physiological effects of drugs and their mechanisms of action, Is an experimental medical science.
A. 对
B. 错
【判断题】
2)It's unreasonable for a physician to be interested mainly in the effects of drugs on human beings, for the pharmacological evaluation of drugs in them may be limited due to technical, legal, and ethical reasons.
A. 对
B. 错
【判断题】
(3) As the effects of drugs are often characterized by significant interspecies variation and may be further modified by disease, clinical pharmacology has never been efibrasized.
A. 对
B. 错
【判断题】
The physician is not interested in drugs that are useful in the prevention,diagnosis,and treatment of human disease, but in chemical agents that are commonly responsible for household and industrial poisoning as well as environmental pollution.
A. 对
B. 错
【判断题】
(5)A drug is said to be useful in therapy if it has the ability to produce its desired effects with only tolerable undesired effects.
A. 对
B. 错
【判断题】
(6)Toxicology deals not only with drugs used in therapy but also with many other chemicals that may be responsible for household, environmental, or industrial intoxication.
A. 对
B. 错
【判断题】
1)With the more efficient screening tests and burgeoning knowledge about how a molecules biological activities are likely to be changed, the traditional approach of discovering new drugs has been improved.
A. 对
B. 错
【判断题】
2)With the parallel synthesis used to identify which small segment of any given large protein would bind to an antibody, Mario Geysen generated a variety of short protein fragments by combining multiple amino acids in different permutations.
A. 对
B. 错
【判断题】
)A parallel synthesis and a split-and-mix synthesis are different in that in a split-and-mix synthesis, all the products are assembled separately n their respective reaction vessels.
A. 对
B. 错
【判断题】
4) In many laboratories, robots are used in the routine work of parallel synthesis to deliver small amounts of reactive molecules into appropriate wells, thus making the process more accurate and less tedious.
A. 对
B. 错
【判断题】
5) In a parallel synthesis, each compound remains in its own container; while in a split-and-min synthesis, the related ce mpounds are mixed up in the same reaction vessel.
A. 对
B. 错
【判断题】
6)In order to solve the difficulties of identifying the compounds made in a parallel synthesis scientists pull out from the mixture the beads that bear biologically active molecules and determine the molecular makeup o d attached.
A. 对
B. 错
【判断题】
1)The concentration of a drug in whole plasma is the most accurate index of the drug concentration at the site(s) of action.
A. 对
B. 错
【判断题】
(2)It is difficult to measure the total concentration of both unbound and bound drug in total plasma.
A. 对
B. 错
【判断题】
(3)The clinical effect of a drug is assumed to be directly related to the plasma drug concentration.
A. 对
B. 错
【判断题】
(4) Systemically acting drugs administered by all routes involve the absorption of drug from the place of administration into the blood.
A. 对
B. 错
【判断题】
5)Bioavailability of a drug indicates whether a therapeutically effective concentration is achieved at the site(s)of action of that drug.
A. 对
B. 错
【判断题】
(6)Prodrugs are not therapeutically effective unless they are changed into therapeutically active forms before or after reaching the systemic circulation
A. 对
B. 错
【单选题】
(1)地球表层覆盖着很多圈层,其中最厚的圈层是 ___
A. 岩石圈
B. 水圈
C. 大气圈
D. 生物圈
【单选题】
(2)目前受人类影响最强烈的地球圈层部位主要在大气圈底层、岩石圈上层以及 ___
A. 生物圈表层
B. 生物圈中层
C. 水圈底层
D. 水圈全部
【单选题】
(3)生物圈的范围为___
A. 大气圈、水圈和岩石圈的全部
B. 大气圈和水圈的全部、岩石圈的上部
C. 大气圈的底部、水圈和岩石圈的全部
D. 大气圈的底部、水圈的全部和岩石圈的上部
【单选题】
(4)地球上最大的生态系统是  ___
A. 森林生态系统    
B. 生物圈     
C. 海洋生态系统     
D. 城市生态系统 
【单选题】
(5)被称为地球之“肺”的是:___
A. 草原     
B. 针叶林      
C. 沼泽地       
D. 热带雨林
【单选题】
(7)地球的表面积总共达到5.1亿平方千米,其中海陆各占的比例大致是 ___
A. 三分海洋七分陆
B. 七分海洋三分陆
C. 四分海洋六分陆
D. 六分海洋四分陆
【单选题】
(8)地球的表面积约为5.1亿平方千米,表面起伏不平,凸出来的地方成为陆地和山脉,而大片大片下凹的部分经过亿万年的积累,被液态海水所淹没而变成了海洋,海洋面积占地球表面积的近___。 
A. 2% 
B. 51% 
C. 71% 
D. 91% 
【单选题】
(9)关于我国地形特点的叙述,不正确的是___
A. 地形多种多样
B. 山地面积广大
C. 地势平坦,起伏和缓
D. 西高东低 呈阶梯状
【单选题】
(10)我国山区面积广大,其劣势是___
A. 森林资源不足
B. 耕地资源不足
C. 水能资源不足
D. 动植物资源不足
【单选题】
(11)北回归线穿过的我国省区自西向东排列正确的是 ①广东 ②广西 ③云南 ④台湾 ___
A. ①②③④
B. ③①②④
C. ③②①④
D. ④①②③
【单选题】
(12)我国少数民族主要分布在___
A. 西北和东北
B. 东北和东南
C. 西南和西北
D. 东南和西南
【单选题】
(13)我国水资源的空间分布特点是___
A. 南丰北缺
B. 东北地区缺水最严重
C. 冬春季节少,夏秋季节多
D. 绝大部分地区水资源丰富
【单选题】
(16)下列叙述中,叙说天气的是___
A. 山前桃花山后雪
B. 塔里木盆地终年干燥少雨
C. 昆明四季如春
D. 忽如一夜春风来,千树万树梨花开
【单选题】
(17)位于江西省海拔1500米左右的庐山成为避暑胜地的主要因素是___
A. 纬度因素
B. 海陆位置
C. 地形因素
D. 季风
【单选题】
(18)大气的运动变化是由___引起的。
A. 冷热不均
B. 水汽交换
C. 地壳运动
D. 万有引力
【单选题】
(19)下列行为不能了解某地天气变化的是___
A. 查看卫星云图
B. 听天气预报
C. 流览“中国气象在线”网站
D. 阅读空气质量日报
【单选题】
(20)地球上的水主要分布在 ___
A. 海洋中
B. 冰川中
C. 大气中
D. 江河中
【单选题】
(21)水循环是指水通过吸收太阳能量改变形态从而转移往返。下列环节中,属于具有产生能源使人们正在利用的是 ___
A. 蒸发
B. 降水
C. 径流
D. 水汽输送
【单选题】
(22)由于水的时空分布问题,经常造成我国不少地区的自然灾害。下列灾害的地区分布格局,属于符合我国一般规律的是 ___
A. 北涝南旱
B. 东涝西旱
C. 南涝北涝
D. 西旱东旱
【单选题】
(23)以下改变水循环措施中,属于对不恰当、不科学的是 ___
A. 开挖运河
B. 建造水库
C. 曲流裁直
D. 围湖造田
【单选题】
(24)夏季天天每公顷森林,可以从地下汲取70~100吨水化为水蒸气。说明森林具有以下什么作用___
A. 调节大气成分
B. 净化空气
C. 增加空气湿度
D. 保护农田
【单选题】
(25)我国正在建设中的“三峡水利枢纽工程”主要是为了解决___
A. 水污染问题      
B. 水资源时间分配不均的问题
C. 水资源空间分布不均的问题         
D. 水资源总量不足的问题
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用