【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
推荐试题
【多选题】
以下哪些账户只能开立储蓄账户,不能开立结算账户___。
A. 定活两便
B. 个人通知存款
C. 教育储蓄
D. 整存整取
【多选题】
关于个人账户管理的说法正确的有___
A. 个人账户按储蓄种类可分为活期账户、定期储蓄账户和其他储蓄账户;
B. 活期账户从性质上可分为个人储蓄账户和个人结算账户;
C. 活期结算账户一般只开立存折,可进行存款、取款,但不能进行转账结算;
D. 定期储蓄账户既可以开立储蓄账户,也能开立结算账户。
【多选题】
保证金账户系空开账户,存值可以通过___值。
A. 网银互联
B. 二代支付
C. 同城
D. 柜面转账
【多选题】
下列关于活期账户的说法正确的有___。
A. 一个身份证只能开立一个白金卡;
B. 代理开卡,不需设置密码,只能办理存款类业务;
C. 16周岁以下监护人代理开卡,视同本人,账户不需再去激活;
D. 现金10万(含),转账50万(含),柜员相互授权;
E. 人民币转账开户允许异名转入,但必须是个人结算账户。
【多选题】
关于二类账户___下列哪些交易不受限制
A. 理财扣款、兑付
B. 贷款发放(仅限采用自主支付的30(含)万元以下的个人消费类贷款、50(含)万元以下个人经营类贷款)
C. 还款
D. 非绑定一类账户转账
【多选题】
若本人未满16周岁,须由监护人代为办理,需提供监护人的身份证,本人身份证或户口簿,以及证明监护人关系的户口簿。如果户口簿无法证明监护人关系,需额外提供能证明监护人关系的证明,如___
A. 公证证明、
B. 派出所的子女关系证明、
C. 法院判决、
D. 出生证明等
【多选题】
下列哪些信息可以在柜面进行信息维护的?___
A. 联系地址
B. 姓名
C. 手机号码
D. 支取方式
【多选题】
M、客户提供折(卡),办理现金存款超过___万元(含)需提供办理人的有效身份证件。
【多选题】
个人活期转账超过___万需授权中心授权。
【多选题】
个人现金业务超过___万需授权中心授权并复核,复核人员还应在存款凭条上签章确认。
【多选题】
活期储蓄存款自2005年9月21日起执行按季结息,每季度第三个月___日为结息日,以结息日挂牌公告的活期存款利率计付利息,次日并入本金起息,元以下的尾数不计利息。
【多选题】
下列说法中错误的是___
A. 外币现汇账户不可以取现
B. 增利帐户类开户和销户最低5万
C. IC卡的销户支持冲正
D. 未提供存款凭证必须录入存款人身份信息。
【多选题】
办理以下业务___需提供办理人身份证件。
A. 提供折(卡)的现金存款金额5万元以下
B. 提供折(卡)的现金存款金额5万元(含)以上
C. 无折(卡)续存金额5万元以下
D. 无折(卡)续存金额5万元(含)以上
【多选题】
以下关于个人销户业务说法错误的是___。
A. 活期账户销户需提供存折(卡),若兰花卡销户的,还应确定除活期主账户外,无其他账户,如存在子账户的,应先将子账户进行销户;
B. 可以当日冲账,凭证状态恢复,建议在2901更换凭证;
C. 不支持卡的销户冲正;
D. 大额账户销户与大额账户取款身份检验相同。
【多选题】
七、无折(卡)续存,则存款人需提供哪些资料___。
A. 个人业务申请单
B. 办理人身份证件
C. 持卡人身份证件
D. 授权书
【多选题】
下列哪些交易必须刷卡才能进行交易___。
【多选题】
我行现有业务币种有哪些___。
A. 人民币
B. 英镑
C. 港币
D. 美元
E. 日元
F. 欧元
【多选题】
2105维护类型可以有哪些___
A. 通存通兑
B. 可销户标识
C. 支取方式维护
D. 属性标签维护
【多选题】
活期存取款选择凭证类型,可以选择___
A. 普通存折
B. 兰花一卡通
C. 金融IC卡
D. 市民卡
E. 兰花白金卡
F. 无_个人保证金
【多选题】
个人活期存款支取方式有___
A. 凭密码
B. 凭证件
C. 凭印签
D. 凭存折
【多选题】
当活期账户存在下列情况时,___,不可销户
A. 约定转存
B. 代扣关系
C. 挂失止付
D. 存在子账户
【多选题】
在做2003个人现金存款时选择凭证类型,可以选择___
A. 普通存折
B. 兰花一卡通
C. 金融IC卡
D. 市民卡
E. 兰花白金卡
F. 无凭证。
【多选题】
存款时是否代理可选择是/否,若有代理,需输入___输入身份信息后可进行核查。
A. 代理人证件类型
B. 代理人证件号码
C. 代理人姓名
【多选题】
账户存在属性异常现象主要包括___
A. 约定转存
B. 签约关系
C. 冻挂止付关系
D. 久悬
【多选题】
以下业务中需要授权中心授权的有___。
A. 现金支取10万(含)以上
B. 现金存款10万(含)以上
C. 转账10万(含)以上
D. 转账50万(含)以上
【多选题】
以下说法正确的是___
A. 5万元(含)以上的取款交易须进行复核,复核人员应在取款凭条上签章确认;
B. 取款金额柜面累计5万(含)以上,必须提供本人身份证件,代理的还需提供代理人的身份证;
C. 所有涉及现金或转账的取款交易,必须刷卡才能办理;
D. 外币现汇账户也可以取现。
【多选题】
我行活期储蓄存款按积数计息:就是按实际天数每日累计账户余额,以累计积数乘以日利率计算利息的方法。积数计息法的计息公式为:利息=累计计息积数×日利率,日利率(‰)计算公式为:___。
A. 年利率(%)÷360
B. 年利率(%)÷365
C. 月利率(‰)÷30
【多选题】
兰花借记IC卡电子现金账户最高余额不得超过___
A. 1000元
B. 1500元
C. 500元
D. 2000元
【多选题】
卡柜面密码临时锁定和锁定的连续累计错误次数为参数化管理,目前分别为( )次和( )次。___
A. 5,20
B. 3,5
C. 3,6
D. 5,6
【多选题】
电子现金业务柜面系统包括___
A. IC卡圈存、IC卡电子现金账户余额查询、电子现金账户销户
B. IC卡圈存、IC卡圈提、IC卡电子现金账户余额查询
C. IC卡圈存、IC卡圈提、电子现金账户销户
D. IC卡圈存、IC卡圈提、IC卡电子现金账户余额查询、电子现金账户销户
【多选题】
金融IC卡按信息载体不同分为___
A. 复合IC和普通IC卡
B. 复合IC和金融IC借记卡
C. 金融IC借记和金融IC电子现金卡
D. 金融IC电子现金卡和普通IC卡
【多选题】
金融IC卡有效期最长为( )年,过期即失效,但IC卡账户下尚未结清的债权债务关系仍然有效。___
A. 5年
B. 8年
C. 10年
D. 15年
【多选题】
电子现金账户无借记功能,是一种具有圈存和消费功能的集成电路型银行卡,最高余额不得超过___元人民币且无密码。
A. 500
B. 1000
C. 2000
D. 10000
【多选题】
金融IC卡因芯片损毁申请换卡的,电子现金账户余额以___后脱机交易流水到账的结果为准。
A. 28天
B. 29天
C. 30天
D. 31天
【多选题】
持卡人本人办理兰花卡书面挂失的,挂失手续办理完毕后,___可办理补领新存单(存折、银行卡)或支取存款。
A. 当日
B. 次日
C. 三天后
D. 以上答案都不是
【多选题】
O、卡类凭证,柜面密码当日连续累计错误超过___次,密码临时锁定。密码临时锁定后,本人可以凭证件到柜面解锁一次。解锁后在原连续累计错误次数基础上继续累计,直至达到( )次锁定,则无法进行柜面解锁,需进行密码挂失。
A. 3,5
B. 5,20
C. 3,6
D. 5,15
【多选题】
电子现金账户办理销户登记( )后,持卡人须持本人有效身份证件及“电子现金账户现金领用单”至()支取电子现金账户余额。___
A. 30天、电子现金账户销户网点
B. 30个工作日、任一营业网点
C. 30个工作日、电子现金账户销户网点
D. 30天、任一营业网点
【多选题】
个人活期开户可以是零余额开户、也可以是非零余额开户。非零开户人民币()元起存,外币等值()人民币的标准。___
A. 1;10
B. 1;20
C. 0.01;10
D. 0.01;20
【多选题】
个人账户维护要求本人办理,交易中的代理人仅指___。
A. 监护代理
B. 法定代理
C. 监护代理和法定代理
【多选题】
我行发行的金融IC卡账户包括___
A. 借记账户及电子现金账户
B. 贷记账户及电子现金账户
C. 借记账户、贷记账户及电子现金账户
D. 以上答案都不是