刷题
导入试题
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CD
解析
暂无解析
相关试题
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
推荐试题
【多选题】
选择室内外配线方式时,应综合考虑以及安全要求等因素。___
A. 线路的用途
B. 配线场所的环境条件
C. 铺设线路长度
D. 安装和维修条件
【多选题】
按照用途常见电杆有等。___
A. 直线杆
B. 耐张杆
C. 跨越杆
D. 转角杆
【多选题】
找正底盘中心的方法是。___
A. 可将基础坑两侧副桩的圆钉上用线绳连成一线或根据分坑记录数据找出中心点
B. 再用垂球的尖端来确定中心点是否偏移
C. 如有偏差,则可用钢钎拨动底盘,调整至中心点
D. 最后用泥土将盘四周覆盖并操平夯实
【多选题】
电动机在以及由于起动或自起动条件差可能起动失败或需要限制起动时间的情况下,需装设过载保护。___
A. 容易过载的
B. 功率在30kW以下的
C. 功率在30kW及以上的
D. 长时间运行且无人监视的
【多选题】
高压断路器根据装设地点选择有。___
A. 户内型
B. 户外型
C. 架空型
D. 落地型
【多选题】
下列对"全电路欧姆定律"的描述,正确的是。___
A. 在闭合的电路中,电路中的电流与电源的电动势成正比
B. 在闭合的电路中,电路中的电流与负载电阻及电源内阻之和成反比
C. 在闭合的电路中,电路中的电流与电源的电动势成反比
D. 在闭合的电路中,电路中的电流与负载电阻及电源内阻之和成正比
【多选题】
10kV跌落式熔断器一般由构成。___
A. 绝缘子
B. 上下接触导电系统
C. 熔管
D. 操作绝缘子
【多选题】
架空绝缘导线连接时绝缘层的处理方法有。___
A. 绝缘护套直径一般应为被处理部位接续管的1.5~2倍
B. 中压绝缘线使用内外两层绝缘护套,低压绝缘线使用一层绝缘护套
C. 截面为240mm2及以上铝芯绝缘线承力接头宜采用液压法接续
D. 承力接头的连接采用插接法
【多选题】
下列行为属于服务规范的内容。___
A. 营业人员必须准点上岗,做好营业前的各项准备工作,实行首问负责制
B. 无论办理业务是否对口,接待人员都要认真倾听,热心引导,快速衔接,并为客户提供准确的联系人、联系电话和地址,实行限时办结制
C. 办理居民客户收费业务的时间一般每件不超过5分钟,办理客户用电业务的时间一般每件不超过20分钟
D. 当有特殊情况必须暂时停办业务时,应列示“暂停营业”标牌
【多选题】
住宅电能表箱主要由或剩余电流动作保护器等组成。___
A. 配电盘面
B. 单相电能表
C. 开关
D. 熔体盒
【多选题】
紧线时导线的初伸长一般处理方法。___
A. 新架空线的施工,若不考虑初伸长的影响,则运行一个时期后将会产生对地距离降低,影响线路的安全运行
B. 新导线在紧线时,应考虑导线的初伸长
C. 一般应在紧线时使导线按照减小一定比例计算弧垂以补偿施工时的初伸长
D. 无法确定初伸长的确切数值时,可以不考虑初伸长的影响
【多选题】
计算负荷时二项式系数法的适用范围是。___
A. 用电设备负荷大
B. 用电设备台数多
C. 各台设备容量相差悬殊
D. 各台设备容量相差不大
【多选题】
自动空气断路器的种类有。___
A. 框式低压断路器
B. 塑料外壳式低压断路器
C. 电动斥力自动开关
D. 漏电保护自动开关
【多选题】
在不变条件下,允许办理更名或过户。___
A. 用电地址
B. 用电容量
C. 用电类别
D. 用电时间
【多选题】
绝缘电阻表短路试验过程中发现指针不指零,说明。___
A. 测试引线短路
B. 测试引线未接好
C. 绝缘电阻表有问题
D. 绝缘电阻表放置不平稳
【多选题】
工程竣工验收所需资料包括。___
A. 工程竣工图及说明
B. 隐蔽工程的施工及试验记录
C. 电气试验及保护整定调试报告
D. 安全工具的试验报告
【多选题】
国家电网公司客户安全用电服务内容是。___
A. 客户受电工程设计审核与检验
B. 受电装置试验与消缺
C. 保护和自动装置整定与检验
D. 用电安全检查
【多选题】
《农村电网剩余电流动作保护器安装运行规程》要求:户保和末级保护宜采用具有功能的保护器。___
A. 过电压保护
B. 过负荷保护
C. 过电流保护
D. 短路保护
【多选题】
熔断器巡视检查的内容。___
A. 检查熔断器和熔体的额定值与被保护设备是否相配合
B. 检查熔断器外观有无损伤、变形,瓷绝缘部分有无闪络放电痕迹
C. 检查熔断器各接触点是否完好,接触紧密,有无过热现象
D. 熔断器的熔断信号指示器是否正常
【多选题】
配电线路要做到有序管理和维护,必须对线路和设备进行。___
A. 命名
B. 和编号
C. 试验
D. 维护
【多选题】
双母线接线方式适用于或馈电回路多而采用单母线分段存在困难的情况。___
A. 用电负荷大
B. 重要负荷多
C. 对供电可靠性要求高
D. 两回电源进线
【多选题】
避雷器主要有等几种。___
A. 保护间隙
B. 管型避雷器
C. 阀型避雷器
D. 氧化锌避雷器
【多选题】
施行人工呼吸法前应做准备工作是。___
A. 检查口鼻中有无异物堵住
B. 解衣扣,松裤带,摘假牙等
C. 检查心跳是否停止
D. 区分被救者身体是否健康
【多选题】
某些特殊缺陷只有在负荷高峰期、雨雾等天气进行夜间巡视才能发现。___
A. 导线断股
B. 接头打火
C. 绝缘子闪络放电
D. 瓷件破损
【多选题】
运行变压器中的电压不得超过分接头电压的5%,如果其过高会造成。___
A. 铁心饱和、励磁电流增大
B. 铁损增加
C. 铁心发热,绝缘老化
D. 影响变压器的正常运行和使用寿命
【多选题】
配电变压器台(室)的验收项目有。___
A. 变压器所装的母线、隔离开关、熔断器等设备,分别根据该设备的验收内容及标准验收
B. 变压器台安装尺寸必须符合图纸要求,横担等铁件应平整,螺丝应紧固,穿入方向正确,丝扣露出螺帽3~5扣,不得过长或过短
C. 高低压引线、母线安装应平整,各部之间距离符合要求
D. 变压器台接地引下线符合接地规程要求
【多选题】
单母线的分段可采用实现。___
A. 跌落式熔断器
B. 隔离开关
C. 继电器
D. 断路器
【多选题】
断路器的分支线的安装要求有。___
A. 各部分接触紧密,安装牢靠,无损坏现象
B. 分支线应敷设在不燃或难燃材料的管、槽内
C. 要将开关设备的灭弧罩或绝缘隔板安装完好
D. 应与其他元件间有足够的安全距离
【多选题】
互感器是一种特种变压器,是一次系统和二次系统间的联络元件,用以分别向的电压和电流线圈供电,正确反映电气设备的正常运行和故障情况。___
A. 测量仪表
B. 继电器
C. 温度表
D. 压力表
【多选题】
装设在进户线的剩余电流动作保护器,其室内配线的绝缘电阻。___
A. 晴天不宜小于0.5MΩ
B. 雨天不宜小于0.08MΩ
C. 雨天不宜小于0.5MΩ
D. 晴天不宜小于0.08MΩ
【多选题】
用电信息采集系统建设工作作业中的安装作业包括:。___
A. 集中器安装
B. 采集器安装
C. 排管布线
D. 电能表安装
【多选题】
电动机由变压器供电的动力回路,允许电动机直接起动的原则是。___
A. 不经常起动的电动机,其容量不宜超过变压器容量的30%
B. 常起动的电动机,其容量不宜超过变压器容量的20%
C. 若照明与动力混合回路,其容量不宜超过变压器容量的50%
D. 若照明与动力混合回路,允许直接起动的电动机容量将会更小
【多选题】
发生火灾必须同时具备的条件是。___
A. 有可燃性物质
B. 有助燃物质(氧化剂、氧气)
C. 有火源或高温
D. 有阻燃物质
【多选题】
《农村供电营业规范化服务(示范)窗口标准》中规定,营业窗口应有的国网公司标识。___
A. 必备
B. 明显
C. 统一
D. 规范
【多选题】
变压器并联运行的条件是。___
A. 阻抗电流大小基本相同
B. 两台变压器联结组标号(联结组别)一致
C. 原副边的额定电压一致
D. 阻抗电压大小基本相同
【多选题】
客户变电站的接线以及供电线路路径的选择应从两方面来综合考虑。___
A. 经济
B. 技术
C. 供电可靠
D. 安全
【多选题】
住宅电能表箱主要由、熔体盒(或剩余电流动作保护器)等组成。___
A. 配电盘面
B. 单相电能表
C. 插座
D. 开关
【多选题】
装拆接地线应使用。___
A. 手套
B. 绝缘手套
C. 木棒
D. 绝缘棒
【多选题】
正弦交流量的三要素指的是。___
A. 瞬时值
B. 角频率
C. 初相位
D. 最大值
【多选题】
制作电缆头时,可采用作为收缩加热工具。___
A. 丁烷气体喷灯
B. 大功率工业用电吹风机
C. 汽油喷灯
D. 液化气喷灯
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用