刷题
导入试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BC
解析
暂无解析
相关试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
推荐试题
【单选题】
我们要建设的现代化是人与自然___的现代化。
A. 和谐相处
B. 和睦相处
C. 和谐共生
D. 和睦共生
【单选题】
加快建立绿色生产和消费的法律制度和政策导向,建立健全___的经济体系。
A. 绿色低碳循环发展
B. 绿色节约循环发展
C. 绿色低碳节约发展
D. 节约低碳循环发展
【单选题】
加强对生态文明建设的总体设计和组织领导,设立___机构。
A. 国有自然资源资产管理和自然环境监管
B. 国有自然资源资产管理和自然生态监管
C. 国有自然资源资产监管和自然生态管理
D. 国有自然环境资产监管和自然生态管
【单选题】
我们要牢固树立社会主义生态文明观,推动___现代化建设新格局,为保护生态环境作出我们这代人的努力。
A. 人与自然和谐共生
B. 人与环境和谐发展
C. 人与自然和谐发展
D. 人与环境和谐共生
【单选题】
解决台湾问题、实现祖国完全统一,是全体中华儿女___,是中华民族( )所在。
A. 一致愿望 根本利益
B. 共同愿望 本质利益
C. 一致愿望 本质利益
D. 共同愿望 根本利益
【单选题】
___是两岸关系的政治基础。
A. “九二共识”
B. 反对“台独”
C. 一个中国原则
D. 和平统一
【单选题】
___是实现社会主义现代化、创造人民美好生活的必由之路。
A. 中国特色社会主义道路
B. 中国特色社会主义理论体系
C. 中国特色社会主义制度
D. 中国特色社会主义文化
【单选题】
___是指导党和人民实现中华民族伟大复兴的正确理论。
A. 中国特色社会主义道路
B. 中国特色社会主义理论体系
C. 中国特色社会主义制度
D. 中国特色社会主义文化
【单选题】
___是当代中国发展进步的根本制度保障。
A. 中国特色社会主义道路
B. 中国特色社会主义理论体系
C. 中国特色社会主义制度
D. 中国特色社会主义文化
【单选题】
坚持创新发展,就是把创新摆在国家发展全局的___
A. 核心位置
B. 重要位置
C. 中心位置
D. 突出位置
【单选题】
坚持开放发展,就要奉行___的开放战略
A. 合作共赢
B. 互利共赢
C. 合作共享
D. 共享共赢
【单选题】
建设现代化经济体系,就是要建设创新引领、协同发展的___
A. 产业体系
B. 市场体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
建设现代化经济体系,就是要建设统一开放、竞争有序的___
A. 产业体系
B. 市场体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
建设现代化经济体系,就是要建设体现效率、促进公平的___
A. 产业体系
B. 市场体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
建设现代化经济体系,就是要建设资源节约、环境友好的___
A. 产业体系
B. 市场体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
建设现代化经济体系,就是要建设多元平衡、安全高效的___
A. 全面开放体系
B. 城乡区域发展体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
建设现代化经济体系,就是要建设彰显优势、协调联动的___
A. 全面开放体系
B. 城乡区域发展体系
C. 收入分配体系
D. 绿色发展体系
【单选题】
___是中国社会主义民主政治的特有形式和独特优势,是实现党的领导的重要方式。
A. 人大协商
B. 协商民主
C. 政党协商
D. 基层民主
【单选题】
___集中体现了一个国家基于文化而具有的凝聚力和生命力,以及由此产生的吸引力和影响力。
A. 文化自信
B. 文化强国
C. 文化软实力
D. 先进文化
【单选题】
___是最大的民生。
A. 就业
B. 创业
C. 人民收入水平
D. 社会保障制度
【单选题】
___是民族昌盛和国家富强的重要标志。
A. 人民幸福
B. 人民安康
C. 人民收入水平
D. 人民健康
【单选题】
我们将按照尊重自然、顺应自然、保护自然的理念,贯彻节约资源和保护环境的___,加快生态文明体制改革,建设美丽中国。
A. 基本国策
B. 基本政策
C. 基本路线
D. 基本纲领
【多选题】
哪些属于新发展理念的内容___
A. 创新
B. 协调
C. 绿色
D. 开放
【多选题】
共享内涵主要指___
A. 全民共享
B. 全面共享
C. 共建共享
D. 渐进共享
【多选题】
深化供给侧结构性改革的主要内容___
A. 推进增长动能转换,以加快发展先进制造业为重点全面提升实体经济
B. 深化要素市场化配置改革,实现由以价取胜向以质取胜的转变
C. 加大人力资本培育力度,更加注重调动和保护人的积极性
D. 坚持续推进‘三去一降一补’,优化市场供求结构
【多选题】
供给侧结构性改革中提出“三去一降一补”是指哪些___
A. 去库存
B. 去杠杆
C. 降成本
D. 补短板
【多选题】
推动供给侧结构性改革、振兴实体经济发展的重要力量是___
A. 高素质的企业家
B. 工匠
C. 劳模
D. 工程师
【多选题】
十八大提出“五位一体”总体布局是指哪些___
A. 经济建设
B. 政治建设
C. 文化建设
D. 社会建设
【多选题】
坚持质量第一、效益优先,以供给侧结构性改革为主线,推动经济发展___
A. 质量变革
B. 效率变革
C. 动力变革
D. 提高全要素生产率
【多选题】
现代化经济体系主要内容有___
A. 建设创新引领、协同发展的产业体系
B. 建设统一开放、竞争有序的市场体系
C. 建设体现效率、促进公平的收入分配体系
D. 建设彰显优势、协调联动的城乡区域发展体系
【多选题】
建设现代化经济体系,需要扎实管用的政策举措和行动。当前,要突出抓好的工作有___
A. 大力发展实体经济
B. 加快实施创新驱动发展战略
C. 激发各类市场主体活力
D. 积极推动城乡域协调发展
【多选题】
走中国特色社会主义政治发展道路,必须坚持___有机统一
A. 党的领导
B. 人民当家作主
C. 依法治国
D. 以德治国
【多选题】
坚持党的领导,就要___
A. 发挥党总揽全局、协调各方的领导核心作用
B. 改进党的领导方式
C. 保证党领导人民有效治理国家
D. 改进党的执政方式
【多选题】
实现人民当家作主,就要___
A. 扩大人民有序政治参与
B. 保证人民依法实行民主选举、民主协商、民主决策、民主管理、民主监督
C. 巩固基层政权,完善基层民主制度
D. 保障人民知情权、参与权、表达权、监督权
【多选题】
坚持依法治国,就要___
A. 维护国家法制统一、尊严、权威
B. 加强人权法治保障
C. 保证人民依法享有广泛权利和自由
D. 健全依法决策机制,构建决策科学、执行坚决、监督有力的权力运行机制
【多选题】
我国基本政治制度是指___
A. 中国共产党领导的多党合作和政治协商制度
B. 人民代表大会制度
C. 民族区域自治制度
D. 基层群众自治制度
【多选题】
发展协商民主,必须___
A. 推进协商民主广泛多层制度化发展
B. 统筹政党协商、政府协商、政协协商
C. 积极开展人大协商、基层协商、人民团体协商,逐步探索社会组织协商,构建程序合理、环节完整的社会主义协商民主体系
D. 确保协商民主有制可依、有规可守、有章可循、有序可遵,不断提高协商民主的科学性和
【多选题】
如何巩固和发展爱国统一战线___
A. 坚持长期共存、互相监督、肝胆相照、荣辱与共,支持民主党派按照中国特色社会主义参政党要求更好履行职能
B. 深化民族团结进步教育,铸牢中华民族共同体意识
C. 全面贯彻党的宗教工作基本方针,坚持我国宗教的中国化,积极引导宗教与社会主义社会相适应
D. 牢牢把握大团结大联合的主题,做好统战工作。
【多选题】
全面准确贯彻“一国两制”方针,必须始终___
A. 准确把握“一国”和“两制”的关系
B. 依照宪法和基本法办
C. 聚焦发展这个第一要务
D. 维护和谐稳定的社会环境
【多选题】
扎实推进祖国和平统一进程,对台工作大政方针有___
A. 坚持“和平统一、一国两制”方针
B. 推动两岸关系和平发展
C. 坚持一个中国原则和“九二共识”
D. 坚决反对和遏制任何形式的“台独”
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用