【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
推荐试题
【单选题】
最常见的栓塞是___
A. 空气栓塞
B. 血栓栓塞
C. 脂肪栓塞
D. 细菌栓塞
E. 羊水栓塞
【单选题】
长管状骨折可能引起的栓塞是___
A. 空气栓塞
B. 血栓栓塞
C. 脂肪栓塞
D. 细菌栓塞
E. 羊水栓塞
【单选题】
炎症是___
A. 白细胞对细菌的作用
B. 由损伤引起的增生性反应
C. 机体对局部损伤的血管反应
D. 机体对损伤的一种防御为主的局部组织反应
E. 损伤对机体的有害影响
【单选题】
细菌进入血液中并大量繁殖,引起全身中毒症状,称之为___
A. 菌血症
B. 病毒血症
C. 毒血症
D. 败血症
E. 脓毒血症
【单选题】
炎症局部的基本组织改变为___
A. 变性、坏死、增生
B. 变性、渗出、增生
C. 变质、充血、肉芽组织形成
D. 变质、渗出、增生
E. 坏死、渗出、肉芽组织形成
【单选题】
患者口渴、尿少,尿中钠高,血清钠>145mmol/L,其水与电解质平衡紊乱的类型是___
A. 高渗性脱水
B. 低渗性脱水
C. 等渗性脱水
D. 水中毒
E. 水肿
【单选题】
下列哪一类水与电解质紊乱早期易发生休克___
A. 低渗性脱水
B. 高渗性脱水
C. 水中毒
D. 低钾血症
E. 高钾血症
【单选题】
休克治疗的首要措施是___
A. 纠正酸中毒
B. 使用血管收缩药
C. 使用血管扩张药
D. 补充血容量
E. 使用强心药
【单选题】
下列哪项不是心力衰竭的诱因___
A. 全身感染
B. 高钾血症
C. 肺动脉高压
D. 重症贫血
E. 过度体力负荷
【单选题】
左心衰竭时临床上最突出的表现是___
A. 下肢水肿
B. 肝脾大
C. 呼吸困难
D. 咳粉红色泡沫痰
E. 咳血
【单选题】
细菌的结构成分中哪一种缺少时仍可以生存___
A. 细胞壁
B. 细胞膜
C. 细胞质
D. 核质
E. 以上均可
【单选题】
细菌中最耐热的结构是___
A. 芽孢
B. 鞭毛
C. 荚膜
D. 繁殖体
E. 菌毛
【单选题】
下列哪种不是细菌合成代谢产物___
A. 色素
B. 细菌素
C. 抗生素
D. 抗毒素
E. 侵袭性酶
【单选题】
正常菌群的致病条件___
A. 寄生部位改变
B. 人体抵抗力降低
C. 菌群失调
D. 以上都是
E. 以上都不是
【单选题】
属于细菌分解性代谢产物的是___
A. 热原质
B. 硫化氢
C. 外毒素
D. 抗生素
E. 维生素
【单选题】
下列哪种方法能最有效杀死芽孢___
A. 紫外线法
B. 巴氏消毒法
C. 高压蒸汽灭菌法
D. 煮沸法
E. 电离辐射法
【单选题】
类毒素与外毒素的区别在于前者___
A. 有抗原体,但无毒性
B. 无抗原体,有毒性
C. 无抗原体,无毒性
D. 有抗原体,有毒性
E. 仅有半抗原性,无毒性
【单选题】
以下描述正确的是___
A. 人工主动免疫接种的物质为抗原
B. 人工被动免疫不能用于治疗
C. 人工主动免疫接种的物质为丙种球蛋白
D. 人工主动免疫主要用于治疗
E. 人工主动免疫主要用于紧急预防
【单选题】
有关人工主动免疫热点的描述不正确的是___
A. 给机体输入抗原性物质
B. 免疫接种后1-4周出现免疫力
C. 免疫力维持时间短
D. 使机体产生特异性体液免疫应答
E. 使机体产生特异性细胞免疫应答
【单选题】
人类B细胞分化成熟的场所是___
A. 骨髓
B. 淋巴结
C. 胸腺
D. 脾脏
E. 肝脏
【单选题】
人类T细胞分化成熟的场所是___
A. 骨髓
B. 淋巴结
C. 胸腺
D. 脾脏
E. 肝脏
【单选题】
与细胞免疫无关的免疫应答是___
A. 移植排斥反应
B. 中和作用
C. 抗肿瘤免疫
D. 接触性皮炎
E. 结核结节的形成
【单选题】
免疫稳定功能增强时可发生___
A. 自身免疫性疾病
B. 感染
C. 肿瘤
D. 自身生理平衡和稳定
E. 超敏反应
【单选题】
乙肝病毒最重要的传播途径是___
A. 消化道
B. 性接触
C. 血液和血制品
D. 直接接触
E. 节肢动物叮咬
【单选题】
注射TAT的目的是___
A. 对易感人群进行预防接种
B. 对可疑破伤风患者治疗及紧急预防
C. 杀灭伤口中繁殖体的破伤风杆菌
D. 主要用于儿童的预防接种
E. 中和与神经细胞结核的毒素
【单选题】
阿司匹林不适用于___
A. 缓解胃肠绞痛
B. 缓解关节痛
C. 治疗胆道蛔虫病
D. 预防血栓形成
E. 防止心肌梗死
【单选题】
下列属于半抗原的是___
A. 细菌
B. 青霉素
C. 病毒
D. 真菌
E. 寄生虫
【单选题】
强心苷中毒引起室性期前收缩宜选用___
A. 苯妥英钠
B. 普萘洛尔
C. 西地兰
D. 维拉帕米
E. 利多卡因
【单选题】
下列哪项不是强心苷的适应症___
A. 充血性心力衰竭
B. 心房纤颤
C. 心房扑动
D. 室性期前收缩
E. 阵发性室上性心动过速
【单选题】
下列组合中最有利于铁剂吸收的是___
A. 果糖+枸橼酸铁铵
B. 维生素C+硫酸亚铁
C. 硫酸钙+硫酸亚铁
D. 同型半胱氨酸+右旋糖酐铁
E. 四环素+硫酸亚铁
【单选题】
治疗左心衰引起的急性肺水肿首选___
A. 呋塞米
B. 氢氯噻秦
C. 螺内酯
D. 阿米洛利
E. 氯噻酮
【单选题】
感染中毒性休克用糖皮质激素治疗应采用___
A. 大剂量肌肉注射
B. 小剂量反复静脉给药
C. 大剂量突击静脉给药
D. 一次负荷量肌肉注射给药,然后静脉维持给药
E. 小剂量快速静脉给药
【单选题】
长期使用糖皮质激素类药物可引起___
A. 低血糖
B. 低血压
C. 低血钠
D. 低血钾
E. 低血钙
【单选题】
责任制护理产生于现代护理学发展的哪一阶段___
A. 以疾病为中心的阶段
B. 以医生为中心的阶段
C. 以护士给中心的阶段
D. 以患者为中心的阶段
E. 以健康为中心的阶段
【单选题】
在以患者为中心的阶段提出了___
A. 生物医学模式
B. 生物-社会-心理医学模式
C. 2000年人人享有卫生保健
D. 人是机器
E. 护理工作要走向家庭社会
【单选题】
护理的目标是在尊重人的需要和权力的基础上提高___
A. 人的生命质量
B. 人的尊严
C. 人的社会地位
D. 医疗服务质量
E. 人的自身价值
【单选题】
健康教育的目的是___
A. 治疗疾病,恢复健康
B. 预防疾病,促进健康
C. 适应疾病,保持健康
D. 安慰患者,恢复健康
E. 适应医疗环境
【单选题】
影响健康的生物因素不包括___
A. 遗传结构
B. 年龄
C. 食物
D. 种族
E. 性别
【单选题】
ABC时间管理法叙述正确的是___
A. A级为重要且必须最优先完成的目标
B. B级不重要但必须完成的目标
C. B级为较重要但可以根据时间安排退后完成的目标
D. c级为较重要,可以根据时间安排退后完成的目标
E. c级为较不重要,但必须马上完成的目标
【单选题】
炎症的全身临床特征有___
A. 红、肿
B. 热、痛
C. 末梢白细胞计数增多
D. 功能障碍
E. 以上都错