【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
推荐试题
【单选题】
燃油系统正常工作时哪个油箱先用完?___
A. 内油箱;
B. 中央油箱;
C. 外油箱。
D.
【单选题】
燃油再循环冷却系统中的回油valve何时关闭?___
A. 当发动机滑油温度高于93℃、发动机处于低燃油流量状态时;
B. 当内油箱油位到达满油位,中央油箱燃油泵停止工作时;
C. 当通气油箱内的溢流传感器感受到溢流信号时。
D.
【单选题】
如FQIC的一个通道故障会怎样?___
A. 一半油量指示数据不可用;
B. FQIS正常工作,仅CFDS报告会有故障显示;
C. 除CFDS报告有故障显示之外会有燃油警告。
D.
【单选题】
如果在地面发动机起动一分钟后放出缝翼,而此时中央油箱有油,模式选择电门在AUTO位,则___
A. 中央油箱燃油泵正在运转;
B. 中央油箱燃油泵停止运转;
C. 机翼油箱燃油泵停止运转。
D.
【单选题】
如果在飞行中放出缝翼,而此时中央油箱有油,模式选择电门在AUTO位,则中央油箱燃油泵将:___
A. 开始工作;
B. 停止工作;
C. 保持状态不变。
D.
【单选题】
如何使加油valve正常打开?___
A. 通过激励一个电磁线圈并提供燃油压力;
B. 仅通过压入人工指令电门;
C. 仅通过打开加油面板并提供压力。
D.
【单选题】
如需从左油箱向右油箱传输燃油,不需打开的valve为:___
A. 放油/传输valve;
B. 左油箱加油valve;
C. 交输valve。
D.
【单选题】
若内油箱里的燃油面下降至低油面传感器时:___
A. 燃油回油valve关闭;
B. 燃油回油valve打开;
C. 中央油箱燃油泵起动。
D.
【单选题】
若吸油valve正工作,则表示机翼油箱:___
A. 两个燃油泵正工作;
B. 仅一个燃油泵向相应发动机供油;
C. 两个燃油泵停止工作。
D.
【单选题】
通气浮子valve用于___
A. 防止燃油进入通气管路;
B. 允许燃油从通气管路放出;
C. 维持油箱增压状态。
D.
【单选题】
下面关于油箱通风保护器的功用的说法不正确的是:___
A. 用于防止地面起火时点燃油箱内的燃油;
B. 用于空气自由出入,但不能防止结冰;
C. 当大量燃油进入通气油箱时可通过通风保护器流到机外。
D.
【单选题】
有的valve作动器包括两个马达,分别由28VDCESSBUS和28VDCBUS2供电。这些valve不包括:___
A. 交输valve;
B. 发动机低压燃油valve;
C. APU低压燃油valve。
D.
【单选题】
再循环燃油回到哪个油箱?___
A. 机翼外油箱;
B. 中央油箱;
C. 机翼内油箱。
D.
【单选题】
在给飞机加油、放油或串油时相应电路如何触.发?___
A. 由飞机电网供电;
B. 通过高油面测试;
C. 面板位置继电器接通后。
D.
【单选题】
主警告灯亮,且有音响警告,模式选择电门上"FAULT"灯亮,原因可能有:___
A. 中央油箱油量少于250kg,左或右油箱油量多于5000kg;
B. 缝翼放出而中央油箱燃油泵停止;
C. 当中央邮箱燃油到达低油面而中央燃油泵不能停止。
D.
【单选题】
左右大翼油箱的油量相差不得超过:___
A. 2000磅;
B. 2000公斤;
C. 2000加仑。
D.
【单选题】
起飞和着陆的最大燃油不平衡是:___
A. 750KG
B. 1500KG
C. 2000KG
D. 5000KG
【单选题】
油箱内电容探头的作用是什么?___
A. 测量油面
B. 测量油温
C. 测量密度
D. 以上A和B
【单选题】
机翼油箱中各有几个泵?___
A. 机翼油箱中各有两个泵
B. 没有燃油泵,因为油箱是空气增压的
C. 机翼油箱中各有一个泵
D. 所有油箱中共有两个泵
【单选题】
燃油计算系统中使用了多少个通道?___
【单选题】
燃油加油控制面板位于:___
A. 左侧机腹整流罩
B. 右侧机腹整流罩
C. 右大翼加油接头旁边
D. 驾驶舱内
【单选题】
正常情况下,在哪里可检查各油箱油量?___
A. ECAM上部显示,燃油页面
B. 仅在ECAM下部显示燃油页面
C. ECAM上部显示
D. ECAM上部显示,或加油操纵面板
【单选题】
回油valve由谁控制:___
A. FMGC
B. FADEC
C. FLSCU
D. FQI
【单选题】
APU的燃油由谁提供?___
A. 油箱泵
B. APU燃油泵
C. APU燃油组件的燃油泵
D. A和B
【单选题】
机翼油箱泵按钮上的失效灯亮是什么意思?___
A. 供油压力太高
B. 供油压力下降
C. 按钮在关闭位
D. A和B
【单选题】
发动机燃油低压valve由谁关闭:___
A. 发动机防火按钮或中央油箱传输valve控制逻辑
B. 发动机防火按钮或方式选择按钮设在人工
C. 发动机防火按钮或发动机主电门
D. A+B+C
【单选题】
当机翼油箱油泵按钮设在OFF位时,失效灯:___
A. 被抑制
B. 压力下降时亮
C. 发动机启动时亮
D. A或B
【单选题】
燃油过滤器阻塞时发动机还有供油吗?___
A. 有,用来自IDG冷却和外侧油箱管路的燃油
B. 没有
C. 有,绕过燃油过滤器(旁通valve)
D. A+C
【单选题】
在交输按钮上,白灯“ON”是什么意思?___
A. valve完全打开
B. valve关闭
C. valve处于运动过程
D. valve自动控制功能打开
【单选题】
中央油箱供油时,大翼油箱油泵按钮设在ON位,大翼油箱泵是否运转?___
A. 是的,大翼油箱泵总是运转。
B. 不,只在中央油箱空的时候。
C. 不,因为中央油箱泵优先。
D. 是的,因为大翼油箱优先。
【单选题】
发动机低压燃油valve关闭于:___
A. 燃油增压泵压力下降时。
B. 发动机关车时或发动机火警按钮按出时。
C. 发动机火警探测系统探测到发动机火警。
D. 机翼油箱油泵按钮设在OFF位时
【单选题】
当内侧油箱油面低时,___
A. 一个内油箱转换valve打开。
B. 一侧大翼内的两个转换valve打开。
C. 每侧大翼内,各一个转换valve打开。
D. 因为中央油箱泵优先供油
【单选题】
油量为多少时,ECAM上显示“LOLVL”(低油面)警告?___
A. 少于500公斤(1100磅)
B. 大于900公斤(1980磅)
C. 少于750公斤(1650磅)
D. 少于250公斤(550磅)
【单选题】
在单发工作时,如果相应达到低油面:___
A. 交输valve必须保持打开
B. 交输valve必须关闭
C. 另一发的燃油失去
D. 交输valve自动保持打开
【单选题】
燃油面板方式选择按钮上的琥珀色失效灯何时燃亮:___
A. 供油压力下降时
B. 中央油箱大于250公斤,任何机翼油箱少于5000公斤
C. 两个中央油箱泵选择在关位
D. 按钮被松出
【单选题】
在地面如果伸出缝翼,中央油箱有油,选择自动(供油)方式,发动机启动一分钟后,会发生什么?(2分钟后停止运转)___
A. 中央油箱泵继续运转。
B. 中央油箱泵关。
C. 大翼油箱泵关。
D. 交输valve自动保持打开
【单选题】
如何检查油量指示处于降级方式?___
A. 油量指示为琥珀色
B. 油量指示的后两位数字被短虚线代替,但无法确定哪一侧受影响
C. 油量指示的后两位数字被短虚线代替,ECAM燃油页面必须调出以检查哪个油箱受影响
D. 对应受影响的油箱的油量指示在ECAM燃油页面上闪烁
【单选题】
在正常压力下,加油时间为多少(近似)___
A. 所有油箱20分钟
B. 机翼油箱17分钟
C. 所有油箱30分钟
D. 以上A或B
【单选题】
油箱通气系统通过______防止由于飞机机动飞行时燃油进入通气系统___
A. 过压保护器
B. 橡皮单向valve
C. 通风浮子valve
D.
【单选题】
关于中央油箱通气系统说法正确的是___________
A. 中央油箱向左通气油箱通气
B. 中央油箱向左和右通气油箱通气
C. 中央油箱自己有通气系统
D.