刷题
导入试题
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
推荐试题
【单选题】
在信贷资金总量一定的情况下,信贷资金周转速度、流动性、安全性、效益性的关系是___。
A. 周转速度快,流动性就越强,安全性就越能得保证。但效益性较差
B. 周转速度快,流动性就越强,安全性就差,效益性较差
C. 周转速度慢,流动性就越差,安全性也就越差,效益性较差
D. 周转速度慢,流动性就越差,安全性也就越好,效益性较好
【单选题】
以下措施不能提高商业银行经营流动性和安全性的是___。
A. 存贷款期限结构匹配
B. 提高存货周转速度
C. 提高应收账款的周转速度
D. 提高二级市场股票的换手频率
【单选题】
下列属于直接融资的行为有___。
A. 何某向工商银行借款100000 元专门用于其企业的工程结算
B. A 公司向B 公司投入资金8000000 元,并占有B 公司30%的股份
C. A 公司通过融资机构向B 公司借款600000 元
D. 何某通过金融机构借入资金120000 元
【单选题】
下列不属于借款申请需明确内容的是。___
A. 基本情况
B. 贷款品种
C. 贷款利率
D. 贷款金额
【单选题】
下列关于贷款种类说法,错误的是___
A. 按照贷款币种可分为人民币贷款和外币贷款
B. 按照贷款期限可分为短期贷款和中长期贷款
C. 按照贷款对象可分为生产企业贷款和外商投资企业贷款
D. 按照贷款利率可分为浮动利率贷款和固定利率贷款
【单选题】
下列不属于间接融资的行为有___。
A. 文小姐向银行借款10 万元专门用于其房屋装修
B. A 公司购入B 公司20%的股权,价值80 万元
C. 赵小姐春节期间通过信用卡透支了2 万元购买年货
D. 郑先生通过银行贷款购买了一辆车
【单选题】
调查的基本要求:熟知客户和客户的业务,取得必要的客户信息资料和信贷业务信息资料,并核实资料的___。
A. 真实性
B. 完成性
C. 可操作性
D. 全面性
【单选题】
商业银行在信贷过程中保持贷款种类和期限的多样化是为了保持信贷的___。
A. 效益性
B. 流动性
C. 安全性
D. 自主性
【单选题】
企业向银行借款属于____,发行债券、股票属于____。___
A. 直接融资;间接融资
B. 间接投资;直接投资
C. 间接融资;直接融资
D. 直接投资;间接投资
【单选题】
关于商业银行“安全性、流动性和效益性原则”的说法,不正确的是___。
A. 为了保证贷款的安全性,商业银行需要合理安排贷款的种类和期限
B. 在信贷资金总量一定的情况下,资金的周转速度加快,效益性相应较差
C. 在贷款规模一定的情况下,一般贷款期限越长,收益越大
D. 贷款期限越长,安全性越高
【单选题】
按贷款用途划分,公司信贷的种类不包括___
A. 基本建设贷款
B. 技术改造贷款
C. 流动资金贷款
D. 自营贷款
【单选题】
___是指特定产品要素组合下的信贷服务方式,主要包括贷款、担保、承兑、信用支持、保函、信用证和承诺等。
A. 交易对象
B. 信贷产品
C. 信贷金额
D. 信贷期限
【单选题】
银行市场细分是根据___差异对市场进行的划分。
A. 信贷产品
B. 卖方银行
C. 买方客户
D. 信贷市场
【单选题】
贷放分控是指银行业金融机构将___作为两个独立的业务环节。
A. 贷前申请与贷款审批
B. 贷款审批与贷款发放
C. 贷款发放与贷款清偿
D. 贷款申请与贷款清偿
【单选题】
处于成熟期的行业的风险性___。
A. 最低
B. 中等
C. 最高
D. 较高
【单选题】
除贷款外,商业银行的资金一般主要用于___。
A. 结算业务
B. 代理业务
C. 存款业务
D. 资金业务
【单选题】
___是银行在商业汇票上签章承诺按出票人指示到期付款的行为。
A. 承兑
B. 担保
C. 贷款
D. 公司信贷
【单选题】
在银行流动资金贷前调查报告中,借款人财务状况不包括___。
A. 流动资金数额和周转速度
B. 主要客户、供应商和分销渠道
C. 资产负债比率
D. 存货净值和周转速度
【单选题】
公司信贷的借款人指___
A. 经工商行政管理机关(或主管机关)核准登记的自然人
B. 经行政机关核准登记的企(事)业法人
C. 经行政机关核准登记的自然人
D. 经工商行政管理机关(或主管机关)核准登记的企(事)业法人
【单选题】
贷前调查中最常用、最重要的方法,同时也是在一般情况下必须采用的方法是___。
A. 现场调研
B. 搜寻调查
C. 委托调查
D. 突击检查
【单选题】
影响行业的外部因素不包括___
A. 国民经济
B. 外部经济
C. 国家政策
D. 企业自身规模效益
【单选题】
银行在对客户进行借款需求分析时,不需要关注的是___。
A. 企业的借款需求原因,即所借款项的用途
B. 企业的还款来源
C. 企业还款的可靠程度
D. 公司的治理结构
【单选题】
以下导致企业流动资产增加的因素不包括___。
A. 季节性销售增长
B. 长期销售增长
C. 资产效率下降
D. 债务重构
【单选题】
主营业务指标通常指主营业务收入占___的比重。
A. 营业额
B. 总资本
C. 全部利润
D. 销售收入总额
【单选题】
以下关于流动比率和企业资产的变现能力关系的说法中,正确的是___
A. 流动比率越高,说明企业资产的变现能力越强
B. 流动比率越高,说明企业资产的变现能力越弱
C. 流动比率越低,说明企业资产的变现能力越强
D. 流动比率与企业资产的变现能力没有关系
【单选题】
以下各项中不能反映应收账款的营运能力的是___。
A. 应收账款周转率
B. 应收账款回收期
C. 应收账款账龄
D. 应收账款余额
【单选题】
以下不属于所有者权益项目的是___
A. 未分配利润
B. 资本公积
C. 盈余公积
D. 流动资产
【单选题】
法人贷款业务,申请信贷业务的客户应当是经___核准登记的企业(事业)法人其他经济组织。
A. 工商行政管理机关(或主管机关)
B. 国税局
C. 人民银行
D. 农村信用社
【单选题】
下列因素与借款人的偿债能力无关的是___。
A. 盈利能力
B. 营运能力
C. 资本结构
D. 产品竞争力
【单选题】
下列关于资产负债率的论述中,错误的是___
A. 资产负债率=负债合计÷资产合计×100%
B. 资产负债率=资产合计÷负债合计×100%
C. 资产负债率反映项目各年负债水平、财务风险及偿债能力
D. 银行从债权安全的角度考虑,总希望借款人的负债水平低一点
【单选题】
下列公式中,不能反映存货周转速度的是___
A. 销货成本/平均存货余额×100%
B. 存货平均余额×计算期天数/销货成本
C. 计算期天数/存货周转次数
D. (期初存货余额+期末存货余额)/2
【单选题】
下列不属于资产负债表的基本内容的是___
A. 资产
B. 负债
C. 资本结构
D. 所有者权益
【单选题】
下列不属于企业财务状况风险的是___
A. 借款人在银行的存款有较大幅度下降
B. 应收账款异常增加
C. 流动资产占总资产比重下降
D. 短期负债增加适当,长期负债大量增加
【单选题】
所有者权益代表投资者对企业___所有权。
A. 全部资产
B. 全部负债
C. 净资产
D. 流动资产
【单选题】
商业银行对借款人最关心的就是其现在和未来的___。
A. 技术水平
B. 销售业绩
C. 偿债能力
D. 信息披露
【单选题】
一般企业贷款操作流程:___
A. 建立正式客户-评级-授信-申请贷款-发放贷款
B. 建立正式客户-授信-评级-申请贷款-发放贷款
C. 建立正式客户-申请贷款-评级-授信-发放贷款
D. 建立正式客户-申请贷款-授信-评级-发放贷款
【单选题】
借款人盈利能力的比率通过___反映。
A. 效率比率
B. 杠杆比率
C. 流动比率
D. 营业利润率
【单选题】
借款人还款能力的主要标志就是___。
A. 借款人的现金流量是否充足
B. 借款人的资产负债比率是否足够低
C. 借款人的管理水平是否很高
D. 借款人的销售收入和利润是否足够高
【单选题】
到的比率。___
A. 平均存货余额,销货收入
B. 销货收入,平均存货余额
C. 销货成本,平均存货余额
D. 平均存货余额,销货成本
【单选题】
反映客户长期偿债能力的比率是___
A. 流动比率
B. 资产负债率
C. 净利润率
D. 速动比率
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用