刷题
导入试题
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
推荐试题
【单选题】
骨盆的结构不包括 ___
A. :第5腰椎
B. :骶骨
C. :尾骨
D. :坐骨
E. :耻骨
【单选题】
使肩关节外展的肌是 ___
A. :胸大肌
B. :三角肌
C. :背阔肌
D. :肱二头肌
E. :肱三头肌
【单选题】
男性骨盆的特点 ___
A. :骨盆外形宽而短
B. :骨盆上口心形
C. :骨盆下口较宽大
D. :骨盆腔圆形
E. :耻骨下角大于90°
【单选题】
女性骨盆的特点 ___
A. :骨盆外形窄而高
B. :骨盆上口心形
C. :骨盆下口较大
D. :骨盆腔漏斗形
E. :耻骨下角小于90°
【单选题】
关于腹股沟管的描述,错误的是 ___
A. :位于腹股沟韧带内侧半上方
B. :是腹壁结构的薄弱区
C. :外口又称皮下环是由腹外斜肌腱膜形成
D. :内口又称腹环
E. :腹腔内容物由内口突出将形成直疝
【单选题】
右侧胸锁乳突肌收缩 ___
A. :头后仰
B. :头歪向右侧、面转向右侧
C. :头歪向左侧、面转向左侧
D. :头歪向右侧、面转向左侧
E. :头前伸
【单选题】
肱三头肌的作用是 ___
A. :屈前臂
B. :屈肘
C. :屈肩关节
D. :伸肘
E. :屈腕
【单选题】
腹肌不包括 ___
A. :腹外斜
B. :腹内斜肌
C. :腹横肌
D. :腰大肌
E. :腰方肌
【单选题】
上肢肌中常进行肌肉注射的部位是 ___
A. :三角肌
B. :大圆肌
C. :小圆肌
D. :冈上肌
E. :冈下肌
【单选题】
下列属于表情肌的是 ___
A. :翼内肌
B. :咬肌
C. :颞肌
D. :眼轮匝肌
E. :以上都不是
【单选题】
不属于肌的辅助结构 ___
A. :浅筋膜
B. :深筋膜
C. :滑膜囊
D. :腱鞘
E. :腱膜
【单选题】
关于膈的描述,错误的是 ___
A. :位于胸腔与腹腔之间
B. :周围部为肌束,中央部为中心腱
C. :主动脉裂孔有主动脉通过
D. :食管裂孔有食管通过
E. :腔静脉裂孔有上腔静脉通过
【单选题】
关于腹股沟管的描述,错误的是 ___
A. :位于腹股沟韧带内侧半的上方
B. :为腹前壁下部的一斜行裂隙
C. :外口位于腹股沟韧带中点上方
D. :男性有精索通过
E. :女性有子宫圆韧带通过
【单选题】
属于皮肌的是 ___
A. :颈阔肌
B. :胸锁乳突肌
C. :背阔肌
D. :股薄肌
E. :甲状舌骨肌
【单选题】
关于腹股沟管的描述,错误的是 ___
A. :位于腹股沟韧带内侧半的上方
B. :为腹前壁下部一斜行裂隙
C. :管的内口称腹环
D. :男性有输尿管通过
E. :女性有子宫圆韧带通过
【单选题】
股三角内由外向内排列的是 ___
A. :股动脉、股静脉、股神经
B. :股神经、股动脉、股静脉
C. :股静脉、股动脉、股神经
D. :股动脉、股神经、股静脉
E. :股静脉、股神经、股动脉
【单选题】
重要的呼吸肌 ___
A. :胸大肌
B. :背阔肌
C. :胸锁乳突肌
D. :膈
E. :前锯肌
【单选题】
能屈髋关节和伸膝关节的是 ___
A. :缝匠肌
B. :股四头肌
C. :股二头肌
D. :半腱肌
E. :半膜肌
【单选题】
能屈髋关节和屈膝关节的是 ___
A. :股二头肌
B. :长收肌
C. :股四头肌
D. :缝匠肌
E. :臀大肌
【单选题】
食管第3个狭窄距离中切牙约 ___
A. :15cm
B. :25cm
C. :40cm
D. :45cm
E. :55cm
【单选题】
阑尾根部的体表投影 ___
A. :左髂前上棘与脐连线的中、外1/3交点处
B. :右髂前上棘与脐连线的中、外1/3交点处
C. :左髂前上棘与脐连线的内、中1/3交点处
D. :右髂前上棘与脐连线的内、中1/3交点处
E. :左、右髂前上棘连线的左、中1/3交点处
【单选题】
十二指肠溃疡的好发部位 ___
A. :上部
B. :降部
C. :水平部
D. :升部
E. :十二脂肠空肠曲
【单选题】
胃溃疡的好发部位 ___
A. :胃底部
B. :胃体部
C. :贲门部
D. :幽门部
E. :胃底与胃大弯附近
【单选题】
关于十二指肠的描述,错误的是 ___
A. :长约25厘米
B. :呈"C"形包绕胰头
C. :上部有十二指肠球
D. :降部有十二指大乳头
E. :水平部有十二指肠悬韧带
【单选题】
肛管内结构不包括 ___
A. :齿状线
B. :肛梳
C. :肛柱
D. :直肠壶腹
E. :肛瓣
【单选题】
上消化道是指 ___
A. :口腔到咽的消化管
B. :口腔到食管的消化管
C. :口腔到胃的消化管
D. :口腔到十二指肠的消化管
E. :口腔到回肠的消化管
【单选题】
鼻咽癌好发于 ___
A. :上鼻甲
B. :上鼻道
C. :咽隐窝
D. :梨状隐窝
E. :蝶筛隐窝
【单选题】
关于阑尾的描述,正确的是 ___
A. :附于结肠
B. :附于盲肠上端
C. :根部在3条结肠带汇合处
D. :麦氏点是阑尾游离端的位置
E. :阑尾属于腹膜外位器官
【单选题】
空肠区别于回肠的特点是 ___ B
A. :管径较小
B. :管壁较厚
C. :粘膜环状襞低而疏
D. :肠壁上有集合淋巴滤泡
E. :血管较少
【单选题】
属于口咽的结构是 ___ B
A. :咽隐窝
B. :腭扁桃体
C. :咽鼓管咽口
D. :梨状隐窝
E. :以上都不是
【单选题】
属于消化道和呼吸道共同通道的是 ___
A. :鼻
B. :咽
C. :喉
D. :口腔
E. :食管
【单选题】
最迟长出的恒牙是 ___
A. :第一磨牙
B. :第二磨牙
C. :第三磨牙
D. :尖牙
E. :切牙
【单选题】
不属于实质性器官的是 ___
A. :肝
B. :肾
C. :膀胱
D. :肺
E. :胰
【单选题】
桡神经沟位于 ___
A. :肩胛骨
B. :肱骨
C. :桡骨
D. :尺骨
E. :以上都不是
【单选题】
属于牙周组织的是 ___
A. :牙釉质
B. :牙骨质
C. :牙髓
D. :牙龈
E. :以上都不是
【单选题】
胃溃疡好发于 ___
A. :贲门
B. :胃底
C. :胃体
D. :幽门部
E. :胃大弯
【单选题】
关于胃的描述,正确的是 ___
A. :胃大部分位于腹上区
B. :贲门部是溃疡和癌症的好发部位
C. :幽门约在第1腰椎体右侧
D. :幽门窦位于幽门管的右侧
E. :临床上所说的“胃窦”为贲门部
【单选题】
口腔与咽的分界 ___
A. :腭垂
B. :腭舌弓
C. :腭咽弓
D. :咽峡
E. :咽扁桃体
【单选题】
关于肛管的描述,正确的是 ___
A. :长约25cm
B. :内有多条纵行的粘膜皱襞,称肛瓣
C. :各肛柱的下端与肛瓣的边缘连结成齿状线
D. :肛门内、外括约肌均为平滑肌
E. :齿状线以上为皮肤
【单选题】
关于直肠的描述,正确的是 ___
A. :长约25cm
B. :位于盆部的前部
C. :在矢状面有两个弯曲,骶曲凸向前
D. :直肠下部显著扩大,称为直肠壶腹
E. :男性直肠前方有膀胱、前列腺和附睾
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用