【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
推荐试题
【单选题】
以下哪种情况存款人不可以申请开立临时存款账户___
A. 设立临时机构
B. 异地临时经营活动
C. 注册验资
D. 收入汇缴资金和业务支出资金
【单选题】
建立银行结算账户定期回访制度是指除基本账户外其他账户开立后___内,应由客户经理或指定人员到单位客户的经营(办公)场所进行实地回访核实。
A. 三日
B. 一个月
C. 三个月
D. 半年
【单选题】
因收入汇缴资金和业务支出资金开立的专用存款账户,存款人应使用的名称为___。
A. 存款人名称
B. 隶属单位名称
C. 固定名称
D. 下属单位名称
【单选题】
临时存款账户有效期限和展期期限合计不得超过___。
【单选题】
下列说法错误的是___
A. 一般存款账户可以办理现金缴存,但不得办理现金支取
B. 单位银行卡的资金必须由其基本存款账户转账存入,该账户不得办理现金收付业务
C. 收入汇缴账户除向其基本存款账户或预算外资金财政专用存款户划缴款项外,只收不付,不得支取现金
D. 业务支出账户除从其基本存款账户拨入款项外,只收不付,其现金支取必须按照国家现金管理的规定办理
【单选题】
一般存款账户用于办理单位客户借款转存、借款归还和其他结算的资金收付。该账户___办理现金缴存,但( )办理现金支取。
A. 可以 可以
B. 可以 不得
C. 不得 可以
D. 不得 不得
【单选题】
单位客户更改名称但不改变开户行及账号的,应于___个工作日内向开户行提交正式公函申请变更,填写《变更人民币银行结算账户申请书》,并出具有关部门的证明文件。
【单选题】
银行对一年未发生收付活动且未欠开户银行债务的单位银行结算账户,应通知单位自发出通知之日起___天内办理销户手续,逾期视同自愿销户,未划转款项列入久悬未取专户管理。
【单选题】
F、单位客户日常经营活动的资金收付及其工资、奖金和现金的支取,应通过___办理。
A. 基本户
B. 一般户
C. 临时户
D. 专用户
【单选题】
G、一般存款账户开户时,哪份证明文件可不用提供。___
A. 开户许可证(基本存款账户信息)
B. 机构信用代码证
C. 营业执照
D. 法人身份证
【单选题】
根据最新《企业银行结算账户管理办法》,以下哪类账户无需人民银行核准___
A. 企业设立的单独核算的食堂、幼儿园、招待所等开立基本存款账户
B. 预算单位开立基本存款账户、专用存款账户
C. 企业破产清算组作为临时机构开立临时存款账户
D. 境内依法设立的企业法人、非法人企业、个体工商户开立基本存款账户
【单选题】
单位银行结算账户综合服务协议签署表(2019版)中的协议名称减少了___。
A. 支票票据行为诚信承诺书
B. 单位客户对账服务协议
C. 人民币单位银行结算账户管理协议
D. 浙江省银行账户/支付账户涉电信网络新型违法犯罪法律责任及防范提示告知书
【单选题】
十九、印鉴变更手续费( ),印鉴挂失手续费___。
A. 10元,10元
B. 10元,20元
C. 50元,50元
D. 10元,50元
【单选题】
单位客户的法定代表人或主要负责人、住址以及其他开户资料发生变更时,应___个工作日内向开户行提交正式公函申请变更。
【单选题】
破产清算组可持人民法院的批文申请开立___。
A. 基本存款账户
B. 专用存款账户
C. 临时存款账户
D. 一般存款账户
【单选题】
银行撤销单位结算账户,于撤销账户___个工作日内,向人民银行报告
【单选题】
账户结清后___将款项一次性划出,( )发生其他金融交易。
A. 允许 不允许
B. 允许 允许
C. 不允许 允许
D. 仅允许 不允许
【单选题】
经办柜员对验印系统中的印鉴记录做销户处理,在客户交回的印鉴卡和本行留存的印鉴卡上标注“注销”字样并签章,___予以审核授权。
A. 柜员相互
B. 会计主管
C. 支行行长
D. 运管科长
【单选题】
对于久悬或已转收益的帐户,进行销户,需先行___进行帐户激活,再按正常帐户的销户步骤进行操作。
A. 2920
B. 2613
C. 2409
D. 2408
【单选题】
账户资料的保管期限为撤销后___年。
A. 5年
B. 10年
C. 15年
D. 永久
【单选题】
___审批同意不得借阅、复印,经审批可以借阅、复印的,应在会计档案查阅登记簿上记录。
【单选题】
根据最新《绍兴银行会计档案管理实施细则》,以下不属于纸质保管期限的是___。
A. 永久
B. 30年
C. 10年
D. 5年
【单选题】
二十九、单位活期存款结息日为:___
A. 每月20日
B. 每季20日
C. 半年一次,分别为6月20日与12月20日
D. 以上说法都不对
【单选题】
现金支票大额取现,对相关审批描述正确的是:___。
A. 主办会计审批基本账户5-50 万元(不含50 万),临时专用账户5-20 万元(不含20 万);
B. 开户银行负责人审批基本账户50-200 万元(不含200 万),临时专用账户20-50 万元(不含50 万);
C. 开户银行管辖行负责人审批基本账户200 万以上,临时专用账户50 万元以上
【单选题】
对于单位活期存款利息描述正确的是___。
A. 按日计提,按季自动结息,也可以进行单户临时结息,计息期间遇到利率调整分段计息,每季末二十日为结息日。
B. 对单位的存款利息可转账,也可支取现金,所计利息应于结息当日入账。
C. 被冻结的款项,不属于赃款的,冻结期均不计付利息。
D. 活期保证金帐户的结息入帐帐户是其对应的结算帐户。
【单选题】
柜员收到客户递交的一式二联现金缴款单和现金,处理业务过程中下列不正确的是___。
A. 收入现金先收款后记账,账号与户名、大小写金额必须一致
B. 现金存款串户等原因客户要求的冲账的可以隔日冲账
C. 收入现金应先卡大数,后清点细数
D. 10万元以上(含10万)大额现金收付,必须换人卡把复点,通过远程集中授权,并在打印后的凭证上签章确认
E. 收款清点过程中发现差错,应当即向交款人讲解情况,若交款人要求退回重新清点,可退回交款人。
【单选题】
对于集中核算子户,可以输入主户账号()+子户编号(),直接记账。___
A. 16位 4位
B. 4位 16位
C. 17位 5位
D. 5位 17位
【单选题】
P、单位定期存款起存金额为___万元。
【单选题】
单位定期存款部提次数:普通定期___次,协议存款、同业存款( )次,通知存款( )次,定期保证金( )次。
A. 1;1;N;N
B. 1;0;N;N
C. 1;0;1;N
D. N;0;1;N
【单选题】
人民币单位定期存款起存金额___万元,可以约定自动转存。人民币单位通知存款起存金额( )万元,一次性存入,可一次或分次支取,最低支取额为( )万元,分次支取的,留存部分如低于起存金额的,则予以清户;不低于起存金额的开具新定期存单,从原存款开户日计算存期。
A. 1、50、10
B. 10、50、5
C. 1、10、5
D. 5、10、1
【单选题】
人民币单位定期存款按存期分___,人民币单位定期存款起存金额( )万元,可以约定自动转存。
A. 3月 6月 一年 三年 五年,1万
B. 3月 6月 一年 二年 五年,1万
C. 3月 6月 一年 二年 三年 五年,1万
D. 3月 6月 一年 二年 三年 五年,5万
【单选题】
单位人民币通知存款起存金额___万元,一次性存入,可一次或分次支取,最低支取额为( )万元。
A. 30 10
B. 50 10
C. 50 20
D. 100 20
【单选题】
单位开立协定存款账户,基本存款额度最低不低于___人民币。
A. 5万元
B. 10万元
C. 20万元
D. 50万元
【单选题】
下列说法正确的是___。
A. 协定存款账户中基本存款额度以内的存款按结息日挂牌公布的活期存款利率计息;超过基本存款额度部分的存款按结息日挂牌公布的协定存款利率计息。计息期间如遇利率调整,则分段计息。
B. 只有在我行开基本户的单位才可申请办理协定存款
C. 办理协定存款须由开户单位与本行签订《协定存款合同》,约定合同期限,最长不超过2年。
D. 协定存款按日计息,按月结息。
【单选题】
协定存款合同期满,甲方需要销户,必须于距合同到期日___天前向乙方提出书面销户通知,并于到期日办理销户手续。
A. 5天
B. 10天
C. 15天
D. 20天
【单选题】
对协定存款账户销户的,如果在结息日销户,超过基本存款额度部分的存款按___挂牌公布的协定存款利率计息;如果不在结息日销户,超过基本存款额度部分的存款从上一结息日起到销户日止,不再按协定存款利率计息,而按( )挂牌公布的活期存款利率计息。
A. 结息日、销户日
B. 开户日、销户日
C. 结息日、开户日
D. 开户日,开户日
【单选题】
原则上在绍兴银行开立单位结算账户,且开户期限已满一个___的单位才能申请办理协定存款。
【单选题】
合同期内,存款单位原则上不得要求销户,如遇特殊情况,须向经办行提交书面销户申请(见附件3),经办行在收到销户申请后___内答复。
A. 3天
B. 5天
C. 3个工作日
D. 5个工作日
【单选题】
定期保证金进行置款的交易码___。
A. 2401
B. 2410
C. 2402
D. 2411
【单选题】
二十、非银承保证金的销户和提前置换销户的银承保证金,需要客户经理提供___通知书。