刷题
导入试题
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
推荐试题
【单选题】
关系数据库管理系统应能实现的专门关系运算包括___。
A. 排序.索引.统计
B. 选择.投影.连接
C. 关联.更新.排序
D. 显示.打印.制表
【单选题】
叙述正确的是___。
A. 数据库是一个独立的系统,不需要操作系统的支持
B. 数据库设计是指设计数据库管理系统
C. 数据库系统中,数据的物理结构必须与逻辑结构一致
D. 数据库管理系统是在操作系统支持下的系统软件
【单选题】
将E-R模型转换成关系模型的过程属于数据库的___。
A. 需求分析
B. 概念设计
C. 逻辑设计
D. 物理设计
【单选题】
下面关于算法的错误说法是___
A. 算法必须有输出
B. 算法必须在计算机上用某种语言实现
C. 算法中的每一个步骤都必须是有明确定义的
D. 算法必须在有限步执行后能结束
【单选题】
评价一个算法好坏的基本原则之一是算法的健壮性。健壮性是指___。
A. 算法能进行长时间运算
B. 算法运行效率高
C. 算法能适应大数据量的运算
D. 算法能对意外情况做出适当反映或进行相应处理
【单选题】
“某课程考试成绩高于85分,记为优秀,否则记为合格”。为实现这个算法,应采用___最合理。
A. 选择结构
B. 直到型循环结构
C. 顺序结构
D. 当型循环结构
【单选题】
超文本传输协议的英文简称是___。
A. TCP
B. IP
C. WWW
D. HTTP
【单选题】
目前发展迅速的___是一种新的计算模式,它将计算.数据.应用等资源作为服务提供给用户的一种计算机集群的计算模式。
A. 云计算
B. 量子计算
C. 分布计算
D. 服务计算
【单选题】
以下___不是目前Internet上常用的搜索引擎。
A. Tencent
B. Google
C. Yahoo
D. Baidu
【单选题】
以下___是正确的IPv4地址。
A. 192.168.0.256
B. 16.67.30
C. 192.168.52.33
D. 190.33.4.1.5
【单选题】
计算机网络最本质的功能是___。
A. 集中管理和控制
B. 分布式处理
C. 数据通信和资源共享
D. 提高计算机的利用率
【单选题】
开放式系统互连参考模型OSI/RM中的最底层是___,负责接收和发送比特流。
A. 物理层
B. 网络层
C. 数据链路层
D. 应用层
【单选题】
在网络的OSI/RM七层模型中, ___工作在数据链路层上。
A. 网关
B. 路由器
C. 交换机
D. 中继器
【单选题】
下列关于计算机病毒的叙述中错误的是___。
A. 只读型光盘不会携带病毒,所以可以放心使用
B. 为了预防病毒带来的破坏,重要数据必须备份
C. 一台机器中木马后,计算机上的各种账号可能被窃取
D. 病毒的传染过程可以归结为:驻入内存→判断传染条件→传染
【单选题】
黑客必须通过以下___才能实现远程控制计算机或窃取其中信息的目的。
A. 蠕虫病毒
B. 木马
C. 邮件病毒
D. 宏病毒
【单选题】
下面哪个症状不是感染计算机病毒时常见到的现象___
A. 屏幕上出现了跳动的小球
B. 打印时显示No paper
C. 系统出现异常死锁现象
D. 系统.EXE文件字节数增加
【单选题】
以下关于防火墙的特点,错误的有___
A. 防火墙可以对网络数据包进行过滤
B. 防火墙可以有效记录网络上的活动
C. 防火墙可以检查进出内部网络的通信量
D. 防火墙可以阻止来自内部网络的攻击
【单选题】
在数据加密技术中,待加密的报文被称为___。
A. 明文
B. 正文
C. 短文
D. 密文
【单选题】
网络中采用什么技术来证明发件人的身份___。
A. 单钥密码体制
B. 照片确认
C. 公钥密码体制
D. 数字签名
【单选题】
普通台式计算机加装___设备后,可以使用无线网络。
A. 路由器
B. WI-FI
C. 无线网卡
D. 固态硬盘
【单选题】
在计算机中,存储10个16*16点阵汉字需要___空间。
A. 256B
B. 320b
C. 256b
D. 320B
【单选题】
在微机配置中,通常内存大小指的是___。
A. 磁盘的容量
B. 硬盘的容量
C. RAM的容量
D. ROM的容量
【单选题】
下列叙述中,错误的是___。
A. 应用程序必须读入外存才能执行
B. 操作系统是用户与计算机硬件的接口
C. Office 2010属于应用软件
D. 指令代码序列称为程序
【单选题】
下列关于Windows 7快捷方式的叙述中,正确的是___。
A. 一个文档只能创建一个快捷方式图标
B. 只能在桌面上创建快捷方式图标
C. 只能为文件创建快捷方式图标
D. 某文档的快捷方式图标与该文档相关联
【单选题】
在Windows 7 环境下,对文件执行复制操作后,“剪贴板”中保存的是___。
A. 该文件中的文本内容
B. 该文件的活动窗口
C. 该文件存放的路径
D. 该文件的内容
【单选题】
在Word 2010中,选择___可实现输入字符覆盖插入点右边的字符。
A. 插入模式
B. 扩展模式
C. 修订模式
D. 改写模式
【单选题】
下列关于Power Point 2010的叙述中,错误的是___。
A. 幻灯片的大小(尺寸)无法改变
B. 幻灯片放映时,可从当前幻灯片开始放映
C. 演示文稿默认的扩展名为pptx
D. 可隐藏某张幻灯片
【单选题】
一幅分辨率为1024*768的24位真彩色图像,其存储容量为___字节。
A. 1024*768*24/8
B. 1024*768*2
C. 1024*768*8/8
D. 1024*768*24
【单选题】
___是指在数据通信时一段时间内接收到的错误比特数与传输的总比比特数之比。
A. 误码率
B. 传输时延
C. 信噪比
D. 传输速率
【单选题】
___不属于计算机网络系统他拓扑结构。
A. 环形结构
B. 树形结构
C. 数字结构
D. 星型结构
【单选题】
下列字符中,ASCII码值最小的是___
A. E
B. B
C. a
D. 3
【单选题】
计算机能直接执行由___编写的程序
A. 符号语言
B. 高级语言
C. 汇编语言
D. 机器语言
【单选题】
在WINDOWS 7中,窗口最大化后,可以___
A. 删除标题栏
B. 改变大小
C. 最小化
D. 移动
【单选题】
在Windows 7 中,不合法的文件名是___
A. bc1.txt
B. b?c.pptx
C. b%c.docx
D. a_b.c
【单选题】
音频数字化的过程可分为___三个步骤。
A. 采样,量化,调剂
B. 采样,压缩,量化
C. 采样,量化,压缩
D. 采样,量化,编码
【单选题】
计算机按网络覆盖范围分类,不包括___
A. 城域网
B. 局域网
C. 以太网
D. 广域网
【单选题】
开放系统互连参考模型(OSI/RM)最底层是___
A. 应用层
B. 物理层
C. 网络层
D. 数据链路层
【单选题】
若一辆共享汽车可以供多个用户使用,而每个用户可选用不同的共享汽车,则用户和共享汽车之间的联系是___.
A. 未知
B. 一对一
C. 一对多
D. 多对多
【单选题】
在计算机中,虚拟内存是从___中划分的一块区域。
A. 内存
B. CPU
C. 显存
D. 硬盘
【单选题】
在Windows7系统工具中,利用___可以释放磁盘上的垃圾文件,增加可用空间。
A. 磁盘清理
B. 磁盘碎片整理程序
C. 磁盘备份
D. 系统还原
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用