刷题
导入试题
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AC
解析
暂无解析
相关试题
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
推荐试题
【单选题】
"耐心解答患者关于疾病情况的疑虑,是为了满足患者___
A. 生理的需要
B. 安全的需要
C. 爱与归属的需要
D. 自尊的需要
【单选题】
"当人觉察到自身有某种疾病而去寻求科学可靠的医疗帮助的行为属于___
A. 保健行为
B. 预警行为
C. 求医行为
D. 遵医行为
【单选题】
"某病人由于过敏性休克而急诊入院,在入院初期,护患关系的模式应是___
A. 主动-被动型
B. 指导-合作型
C. 共同参与型
D. 服务-指导型
【单选题】
"___不是护理道德范畴。
A. 幸福
B. 情感
C. 良心
D. 侥幸
E. 慎独
【单选题】
"“观察熟悉期”的主要任务是___
A. 确定患者的主要健康问题
B. 建立信任感并确认患者需要
C. 解决患者的健康问题
D. 鼓励患者参与护理活动
【单选题】
角色是___
A. 照顾者
B. 教育者
C. 咨询者
D. 管理者
【单选题】
"“急性失血比慢性失血更易引起休克”,这种临床特点体现了___
A. 适应是有一定限度的
B. 适应能力有个体差异
C. 适应与时间密切相关
D. 适应本身可有应激性
【单选题】
"1989年,WHO对健康提出了新概念:___
A. 人体生理功能正常, 无躯体疾病
B. 不但没有疾病, 还要有完整的生理、心理状态
C. 不但没有躯体疾病, 还要有完整的心理状态
D. 有完整的生理状态和社会适应能力
E. 身体健康, 心理健康、社会适应良好和道德健康
【单选题】
"根据Orem自理模式的内容,属于健康不佳时的自理需求是:___
A. 摄入空气、水、食物
B. 维持独处和社会交往的平衡
C. 应对失去亲人的情况
D. 患病后做出相应的生活方式改变
【单选题】
"Roy认为,主要刺激是:___
A. 对当时情境有影响的刺激
B. 一些诱因性的刺激
C. 需立即适应的刺激
D. 构成本人特性的刺激
E. 能够引起机体反应的刺激
【单选题】
"按皮亚杰认识发展论;通过动作与感觉来认识周围的世界是___。
A. 感觉运动期
B. 前运思想
C. 具体运思期
D. 形式运思想
【单选题】
"按照护理理论的着重点不同,罗依(Roy)的适应模式属于___
A. 以需要及问题为中心的理论
B. 以护患关系为中心的理论
C. 以系统为中心的理论
D. 以能量源为中心的理论
【单选题】
"按照马斯洛的人类基本需要层次论 , 生理需要满足后 , 则应满足 :___
A. 安全的需要
B. 尊重的需要C.剌激的需要 D. 爱与归属感的需要
【单选题】
"避免“皮肤饥饿”的有效方法是___
A. 专业性皮肤接触和抚摸
B. 面部表情
C. 倾听
D. 沉默
E. 服饰
【单选题】
"不属于社会性应激源的一项是___
A. 政治动荡
B. 职业变动
C. 乔迁新居
D. 妊娠
【单选题】
妥的是___
A. 指导其家属参与一定的护理活动
B. 对病人进行有计划、有目的的护理
C. 为病人提供24小时连续的护理照顾
D. 发挥病人积极性,指导其进行造口护理
【单选题】
"当病人病情突然加重或恶化时 , 病人常见的角色适应问题是 :___
A. 角色冲突
B. 角色缺如
C. 角色强化
D. 角色消退
E. 角色异常
【单选题】
"当一个离开熟悉的环境进入陌生的文化环境时,表现为有新鲜感,情绪上亢奋和高涨,是处在文化休克的那一阶段___
A. 蜜月阶段
B. 沮丧阶段
C. 恢复调整阶段
D. 适应阶段
【单选题】
为___
A. 主动-被动型
B. 指导-合作型
C. 平等互动型
D. 共同参与型
【单选题】
"法的本质是: ___
A. 全社会的意志
B. 统治者的意志
C. 统治阶级的意志
D. 上升为国家意志的统治阶级的意志
E. 管理者的意志
【单选题】
"根据科尔伯格道德发展的观点,处于习俗道德期的孩子,在道德推理上有什么特点:___
A. 取悦他人、维持秩序
B. 依循道德标准、社会规范
C. 受制外控、服从权威
D. 取悦自己、满足需求
E. 取悦他人、社会规范
【单选题】
"沟通交流的最高层次是___
A. 事务性沟通
B. 分享性沟通
C. 共鸣性沟通
D. 情感性沟通
【单选题】
"关于护理理念的叙述,正确的是___
A. 浪漫主义阶段的护理理念强调工作任务的完成
B. 实用主义阶段的护理理念强调护士自己不应有独立行为
C. 人本主义阶段的护理理念注重服务效率
D. 护理理念指引了护士的思维方式及行为模式
【单选题】
"关于护士管理办法下列哪项叙述不妥___
A. 护士的执业权受法律保护
B. 获护理专科以上毕业文凭者可免于执业考试
C. 执业考试合格者可获得护士执业证书
D. 获得护士执业证书的护士可从事护士工作
【单选题】
"关于文化休克, 描述正确的是 :___
A. 身体健康者应对能力弱
B. 儿童较成年人文化休克症状重
C. 生活阅历丰富者应对能力弱
D. 易适应者应对能力弱
E. 身体衰弱者应对能力弱
【单选题】
"规律的休息和睡眠属于机体防御结构的___
A. 正常防御线
B. 基本结构
C. 抵抗线
D. 弹性防御线
【单选题】
"护理程序的正确概念是___
A. 一种分工类型
B. 一种简化的工作形式
C. 一种系统地解决问题的方法
D. 一种技术操作程序
【单选题】
"护理概念的核心是___
A. 人
B. 健康
C. 护理
D. 环境
【单选题】
"护理人员观察到病人呼吸浅快、呼气延长、发绀,依此判断出病人存在呼吸困难。做出此种判断主要依据的是思维的___
A. 概括性
B. 间接性
C. 逻辑性
D. 物质性
【单选题】
"护理学的四个基本概念指的是: ___
A. 预防、保健、健康、疾病
B. 健康、疾病、治疗、护理
C. 人、环境、健康、护理
D. 人、环境、保健、预防
E. 人、环境、保健、治疗
【单选题】
"护理诊断陈述方式中的“E”指的是___。
A. 诊断名称
B. 症状和体征
C. 临床表现
D. 相关因素
【单选题】
"护士小李在为患者实施护理时,不仅考虑患者本人的因素,还评估其家庭、社会因素,帮助病人适应医院的文化环境,她是运用了文化护理的哪一个原则___
A. 综合性原则
B. 教育原则
C. 调动原则
D. 整体原则
【单选题】
"护士与病人进行交谈时所采取的合适距离为: ___
A. 个人距离
B. 亲密距离
C. 社会距离
D. 公众距离
E. 距离越近越好
【单选题】
"护士在注射青霉素前未给病人做过敏试验,导致病人死亡,这种行为属于___
A. 侵权
B. 犯罪
C. 疏忽大意
D. 玩忽职守
【单选题】
"林女士,34岁,因患乳腺癌而接受了乳腺癌根治术,患者术后常有自卑感,不愿见人,护士应特别注意满足患者的哪一方面需要: ___
A. 生理的需要
B. 安全的需要
C. 爱与归属的需要
D. 尊重的需要
E. 自我实现的需要
【单选题】
"记录护理资料不正确的做法是___
A. 资料记录应及时、准确
B. 主观和客观资料应尽量用病人的原话
C. 避免使用含糊不清的词语
D. 避免护士的主观判断和结论
【单选题】
"健康教育专题讲座的缺点是___
A. 浪费时间
B. 知识系统不完整
C. 不易组织
D. 单向沟通
【单选题】
"拉扎勒斯将个体确认刺激事件与自己是否有利害关系及这种关系的程度的评价方式为 : ___
A. 无关性评价
B. 有益性评价
C. 初级评价D. 次级评价 E. 重新评价
【单选题】
"李先生,35岁,新被确诊为原发性高血压,他努力调整自己的心态去接受患病的事实,此种适应属于: ___
A. 生理适应
B. 心理适应
C. 文化适应
D. 社会适应
E. 技术适应
【单选题】
"马可•波罗说:“看到黄色就会联想到中国”,体现了文化的___
A. 继承性
B. 变异性
C. 象征性
D. 时代性
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用