刷题
导入试题
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
推荐试题
【单选题】
操作后应检查各相的实际位置,无法___实际位置时,可通过间接方式确认设备已操作到位。
A. 知道
B. 判断
C. 观察
D. 猜测
【单选题】
低压配电线路其档距不一定超过___m。
A. 40
B. 30
C. 25
D. 20
【单选题】
室内灯具灯头使用的导线最小截面积,铜线不得小于___mm2,铝线不得小于1.5mm2。
A. 0.5
B. 0.75
C. 1
D. 1.5
【单选题】
三相电度表应按___相序接线。
A. 正
B. 负
C. 零
D. 递
【单选题】
电气设备停电后,即使是事故停电,在未拉开隔离开关和做好安全措施以前,不得___,以防突然来电。
A. 触及设备
B. 进入遮拦
C. 更改操作票
D. 触及设备和进入遮拦
【单选题】
兆欧表手摇发电机有离心式调速装置,转动发电机时使发电机能以___的速度转动。
A. 很快
B. 很慢
C. 先慢后快
D. 恒定
【单选题】
在相同的线电压下,负载作三角形连接时的有功功率是星形连接时有功功率的___倍。
A. 1
B. 2
C. 3
D. 1√3
【单选题】
无论高压设备带电与否,值班人员___单独移开或越过遮拦进行工作。
A. 不得
B. 可以
C. 有条件允许
D. 在这栏外进行这栏内的工作
【单选题】
电阻并联电路中的等效电阻(即总电阻)的倒数等于各并联电阻的倒数___。
A. 相等
B. 之和
C. 之差
D. 成正比
【单选题】
在电阻并联电路中,电流的分配与支路电阻___。
A. 之和
B. 之差
C. 成反比
D. 相等
【单选题】
触电事故季节明显,事故多发生在___月。
A. 3~4
B. 5~6
C. 6~9
D. 9~10
【单选题】
接触器的电寿命约为机械寿命的___倍。
A. 1/5
B. 1/10
C. 1/15
D. l/20
【单选题】
触电者触及断落在地上的带电高压导线,救护人员在未做好安全措施前,不能接近断线点___m范围内,以防止跨步电压。
A. 4~6
B. 6~8
C. 8~10
D. 10~12
【单选题】
电流互感器的二次侧线应选用___mm2的单股绝缘铜导线,中间不得有接头。
A. 1
B. 1.5
C. 2.5
D. 4
【单选题】
___是当雷云接近地面,在架空线路或其他导电凸出物顶部感应大量电荷。
A. 直击雷电过电压
B. 电磁感应过电压
C. 静电感应过电压
D. 冲击过电压
【单选题】
雷电是自然界的一种___现象。
A. 放电
B. 充电
C. 导电
D. 电流冲击
【单选题】
油浸型设备最低油面以下深度不得小于___mm。
A. 10
B. 15
C. 20
D. 25
【单选题】
增安型设备的裸露带电部件的外壳防护不应低于___。
A. IP24
B. IP34
C. IP44
D. IP54
【单选题】
万用表的电压灵敏度越高,测量电压时消耗的功率___。
A. 越大
B. 越小
C. 不变
D. 为零
【单选题】
中间继电器的触点数量比较多,可以将一路信号转变为___信号。
A. 一路
B. 二路
C. 三路
D. 多路
【单选题】
车间及实验室的插座安装高度不宜小于___m。
A. 1
B. 0.6
C. 0.3
D. 0.15
【单选题】
高压架空线路的导线经过居民区时,对地面的最小距离为___m。
A. 3.5
B. 4.5
C. 5.5
D. 6.5
【单选题】
接触器接通能力是指开关闭合接通电流时不会造成触点( )的能力;断开能力是指开关断开电流时可靠的___能力。
A. 熔焊、灭弧
B. 飞弧、灭弧
C. 压力击溅
D. 熔焊、游离
【单选题】
架空电力线路的架设放线,导线的弧垂允许偏差为设计弧垂值的___。
A. ±2.0%
B. ±3.0%
C. ±4.0%
D. ±5.0%
【单选题】
高电阻液体在管道中流动且流速>___时,就能产生静电。
A. 0.2m/s
B. 0.5m/s
C. 1m/s
D. 2m/s
【单选题】
二极管有___个PN结。
A. 1
B. 2
C. 3
D. 4
【单选题】
低压配电网电气设备的保护接地电阻不超过___Ω。
A. 4
B. 10
C. 30
D. 大于30Ω
【单选题】
三相四线制系统不采用三芯电缆另加一根单芯电缆或以导线、电缆金属护套作___。
A. 中性线
B. 保护中性线
C. 保护线
D. 都不可以
【单选题】
携带型接地线应使用___。
A. 多股铜绞线
B. 多股铝绞线
C. 带透明护套的多股软铜线
D. 塑料硬铜线
【单选题】
II类电动工具,其额定电压超过___V。
A. 50
B. 220
C. 380
D. 660
【单选题】
接闪线的保护角一般应在___范围为宜。
A. 0°~l0°
B. 10°~20°
C. 20°~30°
D. 大于30°
【单选题】
在正常工作状态时,本质安全型设备各元件的电流不得大于其额定值得___倍。
A. 2/3
B. 1/3
C. 1
D. 2
【单选题】
依靠回路阻抗分压,将漏电设备故障对地电压限制在安全范围以内是___的。
A. 可能
B. 不可能
C. 有条件许可
D. 提高回路阻抗
【单选题】
感应电动势的大小与磁通的变化速度和载流线圈___成正比。
A. 电压
B. 电流
C. 磁阻
D. 匝数
【单选题】
吸收比是从开始测量起第( )的绝缘电阻( )与第( )的绝缘电阻___的比值。
A. 15s/60s、R15/R60
B. 30s/60s、R30/R60
C. 45s/60s、R45/R60
D. 60s/15s、R60/R15
【单选题】
凡经互感器接入的电度表,其读数要___互感器的变比才是实际读数值。
A. 相加
B. 相减
C. 乘以
D. 除以
【单选题】
接地电阻测量仪用120r/min的速度转动摇把时,表内发出___V左右的交流电压。
A. 200
B. 110
C. 100
D. 50
【单选题】
单人施行人工呼吸和心脏按压时应交替进行,按压次数和吹气次数的比例为___。
A. 5:1
B. 15:2
C. 15:3
D. 20:2
【单选题】
在高压操作中,无遮拦作业人体或其所携带工具与带电体之间的距离应不小于___m。
A. 0.4
B. 0.7
C. 1
D. 1.4
【单选题】
一个电气连接部分或一个配电装置全部停电,则不同地点的工作,发给___张工作票。
A. 一
B. 二
C. 三
D. 按不同地点的
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用