刷题
导入试题
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
A
解析
暂无解析
相关试题
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
推荐试题
【判断题】
某日,北京市的气温为-2 ℃~6 ℃,这一天北京市的温差是4 ℃。
A. 对
B. 错
【判断题】
0是最小的正数。
A. 对
B. 错
【判断题】
向东走一定用正数表示,向西走一定用负数表示。
A. 对
B. 错
【判断题】
在直线上,所有的负数都在0的左边,离0越远,数值越小。
A. 对
B. 错
【判断题】
在直线上,+3和-3所对应的点与0所对应的点的距离相等,所以+3和-3相等。
A. 对
B. 错
【判断题】
没有最小的负数。
A. 对
B. 错
【填空题】
1.“长征五号”运载火箭采用液氢液氧作推进剂。液氢温度为零下253 ℃,记作___,液氧温度为零下183 ℃,记作___。火箭发射时尾部火焰温度达到3000 ℃,记作___。
【填空题】
2.在存折上“存入___”或“支出___”栏目中,“+1000”表示___1000元,“-700”表示___700元。
【填空题】
3.如果电梯上升到7层,记作+7层,那么下降到地下1层,记作___层;停车场在地下3层,记作___层。
【填空题】
4.东、西为两个相反的方向,如果-8 m表示一个物体向西运动8 m,那么+3 m表示这个物体向___运动___m,物体原地不动记作___m。
【填空题】
5.通常,我们规定海平面的海拔高度为0 m,高于海平面的为正,一条鱼在水下35 m处游动,为了追赶猎物,它上升了12 m,现在它所在的海拔高度是___m。
【填空题】
6.上海中心大厦是目前我国的第一高楼,主体楼共118层,如果把第50层记作0层,那么第46层应记作___层,最高层第118层应记作___层。
【填空题】
7.A、B两个冷库,A冷库的温度是-9 ℃,B冷库的温度是-11 ℃,___冷库的温度高一些。
【单选题】
《物权法》第五条规定,物权的种类和内容,由( )规定。
A. 地方法规
B. 行政规章
C. 法律
D. 宪法
【单选题】
《物权法》第六条规定,不动产物权的设立、变更、转让和消灭,应当依照法律规定( )。
A. 登记
B. 交付
C. 转让
D. 签订合同
【单选题】
《物权法》第六条规定,动产物权的设立、和转让,应当依照法律规定( )。
A. 登记
B. 交付
C. 转让
D. 签订合同
【单选题】
《物权法》第七条规定,物权的取得和行使,应当遵守法律,尊重社会公德,不得损害( )和他人合法权益。
A. 公共利益
B. 个人利益
C. 集体利益
D. 公众利益
【单选题】
《物权法》第九条规定,依法属于国家所有的自然资源,所有权可以( )。
A. 登记
B. 不登记
C. 处置
D. 占有
【单选题】
《物权法》第十条规定,不动产登记,由不动产( )的登记机构办理。
A. 上一级
B. 所在地
C. 同级
D. 其他
【单选题】
《物权法》第十六条规定,( )是物权归属和内容的根据。
A. 不动产权证
B. 合同约定
C. 不动产登记簿
D. 证明性文件
【单选题】
《物权法》第二十条规定,当事人签订买卖房屋或者其他不动产物权的协议,为保障将来实现物权,按照约定可以向登记机构申请( )。
A. 抵押登记
B. 预告登记
C. 变更登记
D. 转让登记
【单选题】
《物权法》第二十条规定,预告登记后,债权消灭或者自能够进行不动产登记之日起( )内未申请登记的,预告登记失效。
A. 三个月
B. 六个月
C. 一个月
D. 一年
【单选题】
《物权法》第二十一条规定,因登记错误,给他人造成损害的,( )应当承担赔偿责任。
A. 登记人员
B. 登记机构
C. 申请登记人
D. 造成错误的人
【单选题】
《物权法》第二十二条规定,不动产登记费( )收费。
A. 按面积
B. 按价值
C. 按比例
D. 按件
【单选题】
《物权法》第二十三条规定,动产物权的设立和转让,自( )是发生效力,但法律另有规定的除外。
A. 设立
B. 转让
C. 交付
D. 合同签订
【单选题】
《物权法》第四十五条规定,国有财产由( )代表国家行使所有权;法律另有规定的,依照其规定。
A. 国务院
B. 最高人民法院
C. 全国人民代表大会
D. 财政部门
【单选题】
《物权法》第一百二十七条规定,土地承包经营权自( )时设立。
A. 获得经营权证
B. 签订土地承包合同
C. 土地承包合同生效
D. 实际使用
【单选题】
《物权法》第一百二十八条规定,土地承包经营权流转的期限不得超过( )。
A. 10年
B. 15年
C. 30年
D. 承包期剩余年限
【单选题】
《物权法》第一百三十九条规定,建设用地使用权自( )时设立。
A. 合同签订
B. 交付出让金
C. 登记
D. 交付使用
【单选题】
《物权法》第一百四十九条规定,住宅建设用地使用权期限届满的( )。
A. 依法出让
B. 交付出让金
C. 自动续期
D. 申请续期
【单选题】
《担保法》第六条规定,( )是指保证人和债权人约定,当债务人不履行债务时,保证人按照约定履行债务或者承担责任的行为。
A. 留置
B. 保证
C. 担保
D. 抵押
【单选题】
《担保法》第十九条规定,同一债务有两个以上保证人的,保证人应当按照保证合同约定的保证份额,承担( )责任。
A. 保证
B. 连带
C. 全部
D. 部分
【单选题】
《担保法》第十八条规定,当事人在保证合同中约定保证人与债务人对债务承担连带责任的,为( )责任保证。
A. 保证
B. 连带
C. 全部
D. 部分
【单选题】
《担保法》第十七条规定,当事人在保证合同中约定,债务人不能履行债务时,由保证人承担保证责任的,为( )保证。
A. 一般
B. 连带
C. 全部
D. 部分
【单选题】
《担保法》第二十一条规定,当事人对保证担保的范围没有约定或者约定不明确的,保证人应当对( )债务承担责任。
A. 保证
B. 连带
C. 全部
D. 部分
【单选题】
《担保法》第二十五条规定,一般保证的保证人与债权人未约定保证期间的,保证期间为主债务履行期届满之日起( )个月。
A. 一
B. 两
C. 三
D. 六
【单选题】
《担保法》第二十六条规定,连带责任保证的保证人与债权人未约定保证期间的,债权人有权自主债务履行期届满之日起( )个月内要求保证人承担保证责任。
A. 一
B. 两
C. 三
D. 六
【单选题】
《担保法》第三十三条规定,( )是指债务人或者第三人不转移对法律所列财产的占有,将该财产作为债权的担保。债务人不履行债务时,债权人有权依照法律规定以该财产折价或者以拍卖.变卖该财产的价款优先受偿。
A. 留置
B. 保证
C. 担保
D. 抵押
【单选题】
《担保法》第四十一条规定,依法应办理抵押登记的,抵押权的生效时间为( )。
A. 抵押交付之日
B. 登记之日
C. 签订合同之日
D. 当事人协商之日
【单选题】
《担保法》第四十八条规定,抵押人将已出租的财产抵押的,( )告知承租人,租赁合同继续有效。
A. 无需
B. 当面
C. 书面
D. 电话
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用