刷题
导入试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BC
解析
暂无解析
相关试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
推荐试题
【单选题】
无人机系统通讯链路主要包括:指挥与控制(C、&C、),______ ,感知和规避(S&A、)三种___
A. 空中交通管制(ATC)
B. 电子干扰
C. 无线电侦察
【单选题】
目前世界上无人机的频谱使用主要集中在UHF、L和______波段 ___
A. C
B. VHF
C. 任意
【单选题】
以下不是导航飞控系统组成部分的是:___
A. 传感器
B. 电台
C. 执行机构
【单选题】
导航子系统功能是向无人机提供_____信息,引导无人机沿指定航线安全、准时、准确的飞行___
A. 高度、速度、位置
B. 角速度
C. 角加速度
【单选题】
______是无人机完成起飞、空中飞行、执行任务、返场回收等整个飞行过程的核心系统,对无人机实现全权控制与管理,因此该子系统之于无人机相当于驾驶员之于有人机,是无人机执行任务的关键。___
A. 飞控计算机
B. 飞控子系统
C. 导航子系统
【单选题】
飞控子系统必须具备的功能为:___
A. 无人机姿态稳定与控制,无人机飞行管理,应急控制
B. 无人机飞行管理,与导航子系统协调完成航迹控制,信息收集与传递
C. 无人机起飞与着陆控制,无人机飞行管理,信息收集与传递
【单选题】
飞控子系统可以不具备如下功能:___
A. 姿态稳定与控制
B. 导航与制导控制
C. 任务分配与航迹规划
【单选题】
无人机电气系统一般包括____3个部分___
A. 电源、电缆、接插件
B. 电源、配电系统、用电设备
C. 电缆、供电系统、用电设备
【单选题】
____两者组合统称为供电系统___
A. 电缆和配电
B. 电源和电缆
C. 电源和配电
【单选题】
______的功能是向无人机各用电系统或设备提供满足预定设计要求的电能___
A. 配电系统
B. 电源
C. 供电系统
【单选题】
______的功能通常包括指挥调度、任务规划、操作控制、显示记录等功能___
A. 数据链路分系统
B. 无人机地面站系统
C. 飞控与导航系统
【单选题】
______主要是制定无人机飞行任务、完成无人机载荷数据的处理和应用,指挥中心/数据处理中心一般都是通过无人机控制站等间接地实现对无人机的控制和数据接收。___
A. 指挥处理中心
B. 无人机控制站
C. 载荷控制站
【单选题】
______主要是由飞行操纵、任务载荷控制、数据链路控制和通信指挥等组成,可完成对无人机机载任务载荷等的操纵控制。___
A. 指挥处理中心
B. 无人机控制站
C. 载荷控制站
【单选题】
______与无人机控制站的功能类似,但只能控制无人机的机载任务设备,不能进行无人机的飞行控制。___
A. 指挥处理中心
B. 无人机控制站
C. 载荷控制站
【单选题】
地面控制站飞行参数综合显示的内容包括__________
A. 飞行与导航信息、数据链状态信息、设备状态信息、指令信息
B. 导航信息显示、航迹绘制显示以及地理信息的显示
C. 告警信息、地图航迹显示信息
【单选题】
活塞发动机的爆震最易发生在 :___
A. 发动机处于小转速和大进气压力状态工作
B. 发动机处于高功率状态下工作时
C. 发动机处于大转速和小进气压力转台工作
【单选题】
活塞发动机混合气过富油燃烧将引起_______的问题。___
A. 发动机过热
B. 电嘴积炭
C. 发动机工作平稳,但燃油消耗量变大
【单选题】
下列哪项是飞行控制的方式之一:___
A. 陀螺控制
B. 指令控制
C. 载荷控制
【单选题】
无人的发动机采用重力供油系统但装有增压泵,主要是为了:___
A. 减少油箱的剩余燃油
B. 保证大速度巡航的用油
C. 保证爬升、下降及其它特殊情况下的正常供油
【单选题】
无人机燃油箱通气的目的之一是:___
A. 通气增大供油流量
B. 保证向发动机正常供油
C. 通气减小供油流量
【单选题】
汽化器式活塞发动机在何时容易出现汽化器回火现象:___
A. 热发动起动时
B. 油门收的过猛
C. 寒冷天气第一次起动时
【单选题】
二冲程活塞汽油发动机应使用何种润滑油:___
A. 2T机油
B. 4T机油
C. 汽车机油
【单选题】
中华人民共和国境内的飞行管制:___
A. 由国务院、中央军委空中管制委员会统一组织实施,各有关飞行管制部门按照各自的职责分工提供空中交通管制服务
B. 由中国人民解放军空军统一组织实施,各有关飞行管制部门按照各自的职责分工提供空中交通管制服务
C. 由中国民用航空总局空中交通管理局统一组织实施,各有关飞行管制部门按照各自的职责分工提供空中交通管制服务
【单选题】
多轴的“轴”是指:___
A. 飞行器运动坐标轴
B. 舵机轴
C. 旋翼轴
【单选题】
多轴飞行器难以完成以下哪种工作: ___
A. 测绘
B. 直播
C. 超远距离监控
【单选题】
下列属于多旋翼典型应用的是:___
A. 航拍、电影取景
B. 侦打一体化
C. 高空长航时侦查
【单选题】
无人机系统的机长是指:___
A. 协助操控无人机的人
B. 负责整个无人机系统运行和安全的驾驶员
C. 操控无人机的人
【单选题】
在中华人民共和国境内,按照飞行管制责任划分为:___
A. 飞行管制区,飞行情报区,机场飞行管制区
B. 飞行管制区,飞行管制分区,机场飞行管制区
C. 航路飞行管制区,空域飞行管制区,机场飞行管制区
【单选题】
多旋翼飞行器悬停时的平衡不包括___
A. 前飞废阻力平衡
B. 俯仰平衡
C. 方向平衡
【单选题】
经测试,某多轴飞行器稳定飞行时,动力电池的持续输出电流为5A,该多轴可选:___
A. 10A的电调
B. 15A的电调
C. 5A的电调
【单选题】
在高海拔地区,多旋翼较难离地时,最有效的应对措施是:___
A. 更换大桨
B. 更换大容量电池
C. 减重
【单选题】
X模式4轴飞行器从悬停转换到前进,哪两个轴需要加速:___
A. 右侧两轴
B. 左侧两轴
C. 后方两轴
【单选题】
在升高与下降过程中,直升机与多旋翼表述正确的是:___
A. 飞直升机主要改变旋翼总距,多旋翼主要改变旋翼转速
B. 飞直升机主要改变旋翼转速,多旋翼同样改变旋翼转速
C. 飞直升机主要改变旋翼转速,多旋翼主要改变旋翼总距
【单选题】
无刷电机与有刷电机的区别是:___
A. 有刷电机效率高
B. 无刷电机效率高
C. 两类电机效率差不多
【单选题】
飞行人员未按照中华人民共和国基本规则规定履行职责的,由相关部门依法给予行政处分或纪律处分______,情节严重的依法给予吊销执照或合格证的处罚,或者勒令停飞_________
A. 一至三个月,半年
B. 一至六个月,一至三个月
C. 半年,一至三个月
【单选题】
民用无人驾驶航空器系统视距外驾驶员合格证申请人必须在民用无人驾驶航空器系统上训练不少于______小时的飞行训练时间:___
A. 44
B. 56
C. 100
【单选题】
某多轴飞行器的动力电池标有22.2V,它是:___
A. 22、2S锂电池
B. 6S锂电池
C. 3S锂电池
【单选题】
航空器进行空域飞行时,应当按照规定的______进入空域或者脱离空域 ___
A. 航线(航向)、高度、次序
B. 航线(航向)、高度
C. 航线(航向)、高度、次序和进出点
【单选题】
多旋翼飞行器动力装置多为电动系统的最主要原因是:___
A. 电动系统形式简单且电机速度响应快
B. 电动系统尺寸较小较为廉价
C. 电动系统干净且不依赖传统生物燃料
【单选题】
关于多旋翼的反扭矩说法不正确的是:___
A. 单个旋翼的反扭矩的大小取决于电机转速
B. 多旋翼的俯仰运动通过改变各个旋翼的反扭矩来实现
C. 单个旋翼的反扭矩会迫使多旋翼飞行器向旋翼旋转的反方向偏转
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用