【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
推荐试题
【判断题】
《供电营业规则》规定:用户建设临时性受电设施,需要供电企业施工的,其施工费用应由供电企业负担。
【判断题】
《国家电网公司供电服务质量标准》规定:受理客户举报、建议、意见业务后,应在15个工作日内答复客户。
【判断题】
《供电营业规则》规定:供电企业接到用户事故报告后,应派人赴现场调查,在7天内协助用户提出事故调查报告。
【判断题】
10千伏及以下公用高压线路供电的,以用户厂界外或配电室前的第一断路器或第一支持物为分界点,第一断路器或第一支持物属用户所有。
【判断题】
国家电网公司的企业理念是你用电、我用心。
【判断题】
《供电营业规则》规定:用户迁址,原址按终止用电办理,供电企业予以销户,新址用电优先受理。
【判断题】
《居民用户家用电器损坏处理办法》适用于由供电企业以220/380伏电压供电的居民用户,因发生电力运行事故导致电能质量劣化,引起居民用户家用电器损坏时的索赔处理。
【判断题】
营业厅VI标识六要素包括营业厅门楣、95598小灯箱、营业厅铭牌、营业厅时间牌、防撞条、营业厅背景板。
【判断题】
任何单位或个人在电力设施周围进行爆破作业,必须按照国家有关规定,确保电力设施的安全。
【判断题】
国网电网公司员工服务“十个不准”规定,不准违反政府部门批准的收费项目和标准向客户收费。
【判断题】
窗口服务人员的着装要求是统一、整洁、得体。
【判断题】
《供电服务规范》中营业厅规范规定,当有特殊情况必须暂时停办业务时,应列示“暂停服务”标牌。
【填空题】
1.国家电网公司承诺:对欠电费客户依法采取停电措施,提前___送达停电通知书,费用结清后___内恢复供电。
【填空题】
2. 在供电企业低压供电的线路上,发生零线断线,引起居民家用电器损坏且不可修复,其购买时间在___月及以内的,按___发票价,供电企业全额予以赔偿。
【填空题】
3.国家电网公司承诺:供电服务热线“95598”24小时受理业务咨询、信息查询、___和___。
【填空题】
4.《国家电网公司供电客户服务质量标准》规定的服务渠道有___、95598供电服务热线、网上营业厅、___、银行及其它代办机构、社区及其它渠道。
【填空题】
5.供电服务包括___提供和___服务。
【填空题】
6.国家电网公司员工服务“十个不准”不准违反政府部门批准的___和标准向客户收费,不准对外泄露客户个人信息及___。
【填空题】
7.2011年竣工投运的 “电力天路”是指___联网工程。
【填空题】
8.国家电网公司承诺:受理客户投诉后,___工作日内联系客户,___工作日内答复处理意见。
【填空题】
8.国家电网公司的服务理念是___、___。
【填空题】
9.国家电网公司提出的“两个替代”是指“___替代”和“___替代”。
【填空题】
10.国家电网公司承诺:受电工程检验合格并办结相关手续后,居民客户___个工作日内送电,非居民客户___个工作日内送电。
【填空题】
11.《电力供应与使用条例》规定:因建设需要,必须对已建成的供电设施进行迁移、改造或者采取防护措施时,建设单位应当事先与该供电设施管理单位协商,所需工程费用由___负担。
【填空题】
12.《国家电网公司供电服务质量标准》规定:客户交费日期、地点、银行账号等信息发生变更时,应至少在变更前___个工作日告知客户。
【填空题】
13.《国家电网公司供电服务质量标准》规定:当电力供应不足或因电网原因不能保证连续供电的,应执行政府批准的___。
【填空题】
14. 依据《国家电网公司供电服务质量标准》,受理客户服务申请后,电能表异常业务___个工作日内处理,抄表数据异常业务___个工作日内核实。
【填空题】
15.《国家电网公司供电服务规范》规定:如在工作中损坏了客户原有设施,应尽量恢复原状或___。
【填空题】
16.《供电营业规则》规定:用户应在提高用电___的基础上,按有关标准设计和安装无功补偿设备,并做到随其负荷和电压变动及时投入或切除,防止无功电力___。
【填空题】
17.《供电营业规则》规定:供电企业应不断改善供电可靠性,减少设备检修和电力系统事故对用户的停电___及每次停电___。
【填空题】
18.《国家电网公司供电客户服务质量标准》规定:重要客户停限电告知服务是指供电企业向重要客户提供计划、___、___停限电信息,以及供电可靠性预警的服务。
【填空题】
19.国家电网公司承诺:城市地区供电可靠率不低于___,居民客户端电压合格率___。
【填空题】
20. 《国家电网公司供电服务规范》规定:处理客户投诉应以___和___为依据,以维护客户的合法权益和保护国有财产不受侵犯为原则。
【填空题】
21.“三严三实”是指严以___、严以用权、严以律己,谋事要实、创业要实、___要实。
【填空题】
22.《国家电网公司供电服务规范》规定,___以上供电营业场所无周休日。
【填空题】
23.对窗口服务人员仪容的基本要求是___、大方、端庄。
【填空题】
24. 窗口人员应统一着装,并佩戴___。
【填空题】
25.窗口服务人员接待客户时,应面带微笑,目光专注,做到来有___、去有___ 。
【填空题】
26.供电设施计划检修停电,提前 ___向社会公告。
【填空题】
27. 《国家电网公司95598客户服务业务管理办法》规定,计划停电、___、电网故障停限电、超电网供电能力停限电信息报送内容包括停电类型、停电范围等。