刷题
导入试题
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AD
解析
暂无解析
相关试题
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
推荐试题
【多选题】
省级交通运输 应当及时将年度服务质量评价报告报送 。 ___
A. 主管车间
B. 主管部门
C. 交通运输部
D. 交通宣传部
【多选题】
城市轨道交通服务质量评价管理办法自 起实施,有效期 年。___
A. 2019年7月1日
B. 2009年7月1日
C. 3
D. 4
【多选题】
城市轨道交通服务质量评价坚持以乘客为中心,遵循公平、 的原则。___
A. 及时
B. 有效
C. 公正
D. 公开
【多选题】
城市轨道交通服务质量评价坚持以乘客为中心,遵循 、 、公开的原则。___
A. 公平
B. 公正
C. 科学
D. 灵活
【多选题】
乘客满意度评价应当通过 、电话调查等方式开展。 ___
A. 面访调查
B. 网络调查
C. 书面调查
D. 邮箱调查
【多选题】
乘客满意度评价应当通过面访调查、 方式开展。 ___
A. 集体调查
B. 网络调查
C. 电话调查
D. 邮箱调查
【多选题】
服务保障能力评价应当通过 等方式开展。 ___
A. 实地体验
B. 资料查阅
C. 数据调取
D. 现场测试
【多选题】
服务保障能力评价应当通过 现场测试等方式开展。 ___
A. 实地体验
B. 资料查阅
C. 数据调取
D. 邮箱传达
【多选题】
服务保障能力评价应当通过实地体验、 等方式开展。 ___
A. 演练体验
B. 数据调取、
C. 人员询问
D. 资料查阅
【多选题】
评价实施单位应当 、客观地开展服务质量评价。 ___
A. 独立
B. 公正、
C. 公平
D. 及时
【多选题】
评价实施单位应当独立、 地开展服务质量评价。 ___
A. 有效
B. 公正、
C. 客观
D. 及时
【多选题】
对于规划建设等遗留问题,暂不具备整改条件的,应当在整改报告中详细 ,并通过 等措施加以改进,在保障运营安全的基础上不断提升服务质量。 ___
A. 说明原因
B. 技术、
C. 管理
D. 整改
【多选题】
对于规划建设等遗留问题,暂不具备整改条件的,应当在整改报告中详细说明原因,并通过 等措施加以改进,在保障运营安全的基础上不断提升服务质量。 ___
A. 事情结果
B. 技术、
C. 管理
D. 制定
【多选题】
对于规划建设等遗留问题,暂不具备整改条件的,应当在整改报告中详细 ,并 、管理等措施加以改进,在保障运营安全的基础上不断提升服务质量。 ___
A. 事情结果
B. 事情经过、
C. 说明原因
D. 通过技术
【多选题】
运营服务 涉及的数据应当符合有关规定,有条件的城市应当通过 直接获取。___
A. 关键指标评价
B. 智能管理系统
C. 门禁系统
D. 运营指标
【多选题】
和 适用本城市轨道交通服务质量评价规范。 ___
A. 城市轨道交通线路
B. 运营单位
C. 城市线网服务质量评价工作
D. 集团子公司
【多选题】
城市轨道交通服务质量评价包括 和 。 ___
A. 乘客调查度评价
B. 乘客满意度评价
C. 服务保障能力评价
D. 运营服务关键指标评价
【多选题】
城市轨道交通服务质量评价包括乘客满意度评价、服务保障能力评价和运营服务关键指标评价,基准分值 分。其中,乘客满意度评价分值 分,服务保障能力评价分值300分,运营服务关键指标评价分值 分。 ___
A. 1000
B. 300
C. 400
D. 500
【多选题】
城市轨道交通乘客满意度评价包括 、咨询、投诉、安全感7个评价指标。___
A. 进出站
B. 环境与秩序
C. 设施运行
D. 换乘
【多选题】
城市轨道交通乘客满意度评价包括进出站、环境与秩序、设施运行、 7个评价指标。 ___
A. 换乘
B. 咨询
C. 投诉
D. 安全感
【多选题】
出现以下情形的(因地震、洪涝、气象灾害等自然灾害及其他不可抗力因素导致的除外),应进行核减扣分,以下正确的是: 。 ___
A. 发生5分钟以上(含)15分钟以下延误事件的,每起减5分
B. 发生5分钟以上(含)15分钟以下延误事件的,每起减10分
C. 发生15分钟以上(含)30分钟以下延误事件的,每起减10分
D. 发生15分钟以上(含)30分钟以下延误事件的,每起减20分
【多选题】
出现以下情形的(因地震、洪涝、气象灾害等自然灾害及其他不可抗力因素导致的除外),应进行核减扣分,以下正确的是: 。 ___
A. 连续中断行车(指线路中有2个及以上车站或区间发生行车中断)30分钟以上(含)2小时以下的,每起减20分;
B. 连续中断行车(指线路中有2个及以上车站或区间发生行车中断)30分钟以上(含)2小时以下的,每起减30分;
C. 发生一般运营突发事件的,每起减20分;
D. 发生一般运营突发事件的,每起减50分;
【多选题】
出现以下情形的(因地震、洪涝、气象灾害等自然灾害及其他不可抗力因素导致的除外),应进行核减扣分,以下正确的是:___
A. 发生5分钟以上(含)15分钟以下延误事件的,每起减5分;
B. 发生15分钟以上(含)30分钟以下延误事件的,每起减10分;
C. 连续中断行车(指线路中有2个及以上车站或区间发生行车中断)30分钟以上(含)2小时以下的,每起减20分;
D. 发生一般运营突发事件的,每起减50分;
【多选题】
根据乘客满意度评价内容设计调查问卷。调查问卷采用 3级文字量表,分值系数分别对应1、0.5、0。___
A. 非常满意
B. 满意
C. 一般
D. 不满意
【多选题】
根据乘客满意度评价内容设计调查问卷。调查问卷采用满意、一般、不满意3级文字量表,分值系数分别对应 。 ___
A. 2
B. 1
C. 0.5
D. 0
【多选题】
乘客满意度调查样本量应综合 和 等因素合理确定。 ___
A. 乘客总体特征
B. 调查结果精度
C. 调查时间
D. 费用
【多选题】
城市轨道交通服务保障能力评价包括 乘车和基础保障等6个一级指标。___
A. 进出站
B. 问询
C. 购检票
D. 候车
【多选题】
城市轨道交通服务保障能力评价包括进出站、问询、购检票、候车、 和 等6个一级指标。 ___
A. 刷卡
B. 出闸
C. 乘车
D. 基础保障
【多选题】
城市轨道交通服务保障能力评价包括6个一级指标,其中进出站一级指标包括 指标。 ___
A. 标志标识
B. 乘车信息
C. 客流组织
D. 人员
【多选题】
城市轨道交通服务保障能力评价包括6个一级指标,其中购检票一级指标包括 指标。 ___
A. 购票
B. 检票
C. 人员
D. 设施
【多选题】
开展服务保障能力评价工作应组成不少于 人的评价组,评价组成员应当与被评价对象无隶属关系或利害关系,其中至少 人具有 年以上(含)城市轨道交通运营管理相关工作经历。 ___
A. 4
B. 5
C. 6
D. 7
【多选题】
服务保障能力评价应设计抽样方案,车站样本量不应少于该线路站点总数的 ,并覆盖该线路换乘车站、常态化限流车站以及日均进站量最大车站等;列车样本量不应少于 列次。 ___
A. 10%
B. 20%
C. 5
D. 7
【多选题】
城市轨道交通运营服务关键指标包括 等3个类别。 ___
A. 客运组织
B. 行车服务
C. 客运设施可靠性
D. 乘客投诉回应
【多选题】
城市轨道交通运营服务关键指标行车服务包括哪些评价指标? ___
A. 列车运行图兑现率(%)
B. 列车正点率(%)
C. 列车服务可靠度(万列公里/次)
D. 客运强度(万人次/公里·日)
【多选题】
城市轨道交通运营服务关键指标客运设施可靠性包括哪些评价指标? ___
A. 列车运行图兑现率
B. 列车正点率
C. 列车服务可靠度(万列公里/次)
D. 客运强度(万人次/公里·日)
【多选题】
城市轨道交通运营服务关键指标乘客投诉回应包括哪些评价指标? ___
A. 百万乘客有效投诉率(次/百万人次)
B. 百万乘客无效投诉率(次/百万人次)
C. 有效乘客投诉回复率(%)
D. 无效乘客投诉回复率(%)
【多选题】
列车服务可靠度统计期内,全部列车总行车里程与 (有轨电车 )及以上延误次数之比,单位为万列公里/次。 ___
A. 3min
B. 5min
C. 8min
D. 10min
【多选题】
正点列车是指在执行列车运行图过程中,列车到达终到站的时刻与列车运行图计划时刻相比误差不大于 (市域快速轨道交通系统和有轨电车除外)的列车次数。对市域快速轨道交通系统,正点的时间界限值是指列车到达终到站的时刻与列车运行图计划时刻相比误差不大于 。对有轨电车,正点的时间界限值是指列车到达终到站的时刻与列车计划时刻相比误差不大于 。___
A. 2min
B. 3min
C. 5min
D. 10min
【多选题】
以下说法正确的是: 。 ___
A. 运营单位获得省级及以上人民政府或交通运输部表彰表扬的,每项加10分
B. 获得城市人民政府或省级交通运输主管部门表彰表扬的,每项加5分
C. 获得城市轨道交通运营主管部门表彰表扬的,每项加3分
D. 班组和个人因运营管理工作突出,获得省级及以上人民政府或交通运输部表彰表扬的,每项加1分
【多选题】
得分为各评价指标得分之和。各评价指标得分为全部有效乘客问卷中该指标得分的算术 。 ___
A. 乘客服务度
B. 乘客满意度
C. 平均值
D. 总和
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用