【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
推荐试题
【单选题】
消防专用电话采用___呼叫通话方式,无需拨号。
【单选题】
通常消防员灭火防护头套采用___材料针织制成。
【单选题】
消防员灭火防护头套损毁长度不应大于100mm续燃时间不应大于___
【单选题】
防静电内衣具有较强___功效,具有吸湿、透气、舒适等优点,能有效防止易燃易爆工作环境。
【单选题】
消防护目镜的镜片通常采用___材料,镜片内侧具有防雾涂层,外侧具有防刮涂层,并且具有较高的紫外线吸收率。
A. 聚碳酸酯
B. 玻璃
C. 塑胶
D. 木质
【单选题】
消防员隔热防护服是消防员在灭火救援靠近___区受到强辐射热侵害时穿着的防护服
【单选题】
以下关于隔热防护服维护保养说法错误的是:___
A. 灭火或训练后,消防员隔热防护服应及时清洗、擦净、晾干
B. 隔热层和外层可以一起清洗,清洗时不能使用硬刷或用强碱,以免影响防水性能。
C. 消防员隔热防护服在运输中应避免与油、酸、碱等易燃、易爆物品或化学药品混装。
D. 消防员隔热防护服应贮存在干燥、通风的仓库中。
【单选题】
以下关于避火防护服维护保养说法错误的是:___
A. 使用后可用干棉纱将消防员避火防护服表面烟垢和熏迹擦净
B. 镀金视窗应用软布擦拭干净,并覆盖一层PVC膜保护,以备再用
C. 消防员避火防护服应保存在干燥通风处,防止受潮和污染
D. 衣服上的污垢可用软毛刷蘸中性洗涤剂刷洗,并用清水冲洗净,可以用水浸泡或捶击
【单选题】
电绝缘装具是消防员在具有7000V以下高压电现场作业时穿着的用于保护自身安全的防护装具,具有耐高电压、___耐酸、碱等性能。
【单选题】
以下关于电绝缘装具说法错误的是:___
A. 电绝缘装具具有优良的耐电压性能,能与火焰及熔化物直接接触。
B. 电绝缘装具在使用前,要认真检查有无破损,如有破损及漏电现象,严禁使用。
C. 电绝缘装具在保存期间,严禁受热及阳光照射,不许洗涤,不许接触活性化学物质及各种油类。
D. 电绝缘装具在符合标准规定的条件下保存,保质期为二年
【单选题】
防化手套适用于消防员在处置___事故现场作业时的手部和腕部防护。
A. 火场灾害
B. 辐射灾害
C. 化学灾害
D. 有毒灾害
【单选题】
下列不属于消防人员基本防护装备的是___。
A. 消防头盔
B. 灭火防护服
C. 一级防护服
D. 空气呼吸器
【单选题】
下列哪类不属于重大灾害事故应急救援中的个人防护等级___。
【单选题】
下列哪项内容不属于洗消处理___。
A. 场地洗消
B. 器材洗消
C. 人员洗消
D. 车辆洗消
【单选题】
公安消防部队在参与重大灾害事故应急救援中,二级个人防护为___。
A. 全身、封闭式防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
B. 全身、内置式重型防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
C. 全身、简易防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
D. 呼吸、简易防化服、战斗服、简易滤毒罐、面罩或口罩、毛巾等防护器材
【单选题】
公安消防部队在参与重大灾害事故应急救援中,三级个人防护为___。
A. 全身、封闭式防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
B. 全身、内置式重型防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
C. 全身、简易防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐
D. 呼吸、简易防化服、战斗服、简易滤毒罐、面罩或口罩、毛巾等防护器材
【单选题】
处置大型化工装置、设施、油罐等事故,应及时要求___到场协助,及时控制火势,遏制爆炸。
A. 各级消防部队灭火救援专家
B. 特勤中队携带相关救援装备
C. 事发单位的技术人员
D. 安检、环保、公安、武警等有关部门。
【单选题】
下列哪任务不属于公安消防部队承担的各种事故的抢险救援___。
A. 地震
B. 危险化学品泄漏事故
C. 建筑物倒塌事故
D. 交通事故
【单选题】
下列哪任务不属于公安消防部队承担的各种自然灾害的抢险救援___。
A. 地震
B. 风灾
C. 水灾
D. 建筑物倒塌
【单选题】
下列哪特点不属于公安消防部队抢险救援任务特点___。
A. 多样性
B. 复杂性
C. 艰巨性
D. 突发性
【单选题】
下列哪内容不属于公安消防部队抢险救援的基本原则___。
A. 政府领导,统一指挥
B. 快速行动,科学处置
C. 以人为本,救人优先
D. 加强调度,连续作战
【单选题】
公安消防部队在参加抢险救援行动中进入剧毒重度危险区时,应实施___级防护。
【单选题】
公安消防部队在参加抢险救援行动中进入剧毒轻度危险区时,应实施___级防护。
【单选题】
公安消防部队在参加抢险救援行动中进入低毒中度危险区时,应实施___级防护。
【单选题】
公安消防部队在参与重大灾害事故应急救援中: 全身、内置式重型防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐属于___级防护。
【单选题】
公安消防部队在参与重大灾害事故应急救援中: 全身、封闭式防化服、全棉防静电内外衣、正压式空气呼吸器或全防型滤毒罐属于___级防护。
【单选题】
公安消防部队在参与重大灾害事故应急救援中: 呼吸、简易防化服、战斗服、简易滤毒罐、面罩或口罩、毛巾等防护器材属于___级防护。
【单选题】
事故现场有易燃易爆气体或有毒有害物质扩散时,在扩散区___选择进攻路线接近扩散区。
A. 上风、侧上风方向
B. 上风方向
C. 下风、侧上风方向
D. 下风方向
【单选题】
下列哪项设备不属于洗消设备___。
A. 消防部队装备的专用洗消车、洗消帐篷
B. 军队防化部门装备的供人员洗消用的洗消车和供地面洗消用的喷洒车
C. 消防水罐车、环卫洒水车
D. 防爆水泵
【单选题】
液化石油气泄漏事故特点为___。
A. 扩散迅速,危害范围大、易发生爆炸燃烧事故和处置难度大。
B. 扩散迅速,危害大、易造成大量人员中毒伤亡和污染环境,洗消困难。
C. 易发生爆炸燃烧事故、易造成人员中毒伤亡和污染环境。
D. 突发性强,危害大;易造成大量人员中毒伤亡;易造成交叉感染;政治影响大和救援难度大。
【单选题】
液化石油气处置过程中进入现场或警戒区内的人员必须___。
A. 佩戴隔绝式呼吸器,穿着全封闭式消防防化服
B. 佩戴隔绝式呼吸器,穿着简易消防防化服
C. 可穿纯绵战斗服,扎紧裤口袖口,勒紧腰带裤带
D. 全身浇湿
【单选题】
液化石油气处置过程中驱散稀释不得使用___水枪,以免强水流冲击产生静电。
【单选题】
液氯常温下为___的气体。
A. 黄色、有强烈刺激性臭味
B. 黄绿色、有强烈刺激性臭味
C. 黄色、无味
D. 黄绿色、 无味
【单选题】
液化石油气泄漏事故处置的程序和措施为___。
A. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生、排除险情和清理移交
B. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生
C. 接警出动、个人防护、现场询情、侦察检测、排除险情、现场急救、作好灭火准备和清理移交。
D. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生、控毒排险、现场急救、洗消处理、清理移交
【单选题】
氯气泄漏事故处置的程序和措施为___。
A. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生、排除险情和清理移交
B. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生
C. 接警出动、个人防护、现场询情、侦察检测、排除险情、现场急救、作好灭火准备和清理移交。
D. 接警出动、个人防护、现场询情、侦察检测、设立警戒、疏散救生、控毒排险、现场急救、洗消处理、清理移交
【单选题】
液化石油气处置过程中倒罐、转移必须在___的掩护下进行,以确保安全。
A. 喷雾水枪
B. 消防水炮
C. 泡沫枪
D. 直流水枪
【单选题】
液氯泄漏事故进入事故现场的救援人员必须佩戴隔绝式呼吸器,进入内部执行关阀堵漏任务的救援人员要按___防护标准加强个人防护。
【单选题】
公路交通事故特点为___。
A. 事故频率高、人员伤亡大、易引发次生灾害和救援难度大
B. 事故地点不确定、物质性质难判定、事故危险性大和处置难度大
C. 易引发次生灾害、人员伤亡大、堵塞隧道交通、经济损失大和救援困难
D. 人员伤亡重、容易引发次生灾害、造成交通中断和救援困难