刷题
导入试题
【单选题】
Which type of malicious software can create a back-door into a device or network?___
A. bot
B. worm
C. virus
D. Trojan
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
D
解析
暂无解析
相关试题
【单选题】
Which security term refers to the like lihood that a weakness will be exploited to cause damage to an asset?___
A. threat
B. risk
C. countermeasure
D. vulnerability
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
推荐试题
【单选题】
关于凹版印刷说法错误的是___。
A. 印出的文字或图案立体感强,层次分明
B. 用手触模有明显凹凸感
C. 多使用于护照的封二或封三页的说明词、花纹图案,或贴纸签证的顶部和边框中
D. 图文边缘呈锯齿形
【单选题】
潜影图文采用___方式。
A. 平版印刷
B. 凹版印刷
C. 凸版印刷
D. 丝网印刷
【单选题】
___可一次印出多种色彩,且线条对接完整,不同颜色之间互不浸染。
A. 接线印刷
B. 正反对印
C. 彩虹印刷
D. 缩微印刷
【单选题】
下列防伪技术,属于印刷环节的是___
A. 安全纤维
B. 缩微图文
C. 光栅图像
D. 丝网印刷
【单选题】
关于变形图文下列说法正确的是___
A. 常光下不可见
B. 通常使用雕版印刷技术
C. 用手触摸有凸凹感
D. 通常用于护照证件的底纹
【单选题】
装订指为了防止证件被___而用人工或机械的方式将证件纸张装订成册,并覆上品质稳定村质坚韧的封皮的过程。
A. 拆装变造
B. 冒名顶替
C. 整本伪造
D. 揭换相片
【单选题】
扩照号码是在以下哪个环节印制的___。
A. 造纸
B. 印刷
C. 装订
D. 签发
【单选题】
当封皮粘贴完毕后,对证件进行最后载切时,___的装订线也会受到影响。
A. 回针
B. 不回针
C. 锁头
D. 两头留有空白
【单选题】
下列情况中,装订线不一定是经过拆装的是___。
A. 装订线孔眼非三角形集束状,有外翻现象
B. 紫外光下,荧光反应正常且装订线两侧纸张有残留的荧光剂痕迹
C. 棉线材质的装订线紧致有序,但有轻微起毛现象
D. 装订线两侧有多余的孔眼
【单选题】
下列防伪技术,属于装订环节的是___。
A. 正反对印
B. 穿孔号码
C. 防伪圆片
D. 激光全息图案
【单选题】
下列防伪技术,属于装订环节的是___。
A. 潜影图文
B. 缩微印刷
C. 圆角切割
D. 激光全息图案
【单选题】
将装订线侧对着光源以水平角度平视,如果在装订线两侧的签证页上有锐器留下的挑压印痕,则该护照___。
A. 被揭换照片
B. 被涂改
C. 系整版伪造
D. 被折装
【单选题】
关于激光全息塑封膜,说法错误的是___ 。
A. 动态地变换护照资料页的角度,膜上的图案会逐一显现但不是全部展现
B. 只从一个角度观察,无法观察到整个膜上所有图案的全貌
C. 膜本身没有内在颜色或者颜料
D. 在同一个角度下全部的图案均清楚、明亮地展现
【单选题】
___的特性就是能够把光沿着光源方向反向反射至光源处,或反射至接近光源的位置。
A. 常光
B. 侧光
C. 同轴光
D. 紫外光
【单选题】
关于硬卡膜,说法错误的是___。
A. 由多层塑料材料层压复合而成
B. 硬卡膜无法在签发阶段单独加入护照之中,只能在护照装订过程中加入
C. 硬卡膜制作成本高、制作难度大
D. 使用硬卡膜的护照,装订阶段与签发阶段区分明显
【单选题】
墨点分布无规律,渗入纸张内部,文宇有时出现洇散现象是___方式的图文特征。
A. 喷墨打印
B. 激光打印
C. 热转印
D. 热升华
【单选题】
黄色追踪码是___方式所特有的。
A. 喷墨打印
B. 激光打印
C. 热转印
D. 热升华
【单选题】
___的图文特征是可见彩色小圆点、质地凸起,文字部分比划轮廓呈阶梯状,边缘清晰。
A. 喷墨打印
B. 激光打印
C. 热转印
D. 热升华
【单选题】
___的打印宇迹有光泽,由粉末堆积而成,周围可见墨粉散落痕迹,并伴随小黄点。
A. 喷墨打印
B. 激光打印
C. 热转印
D. 热升华
【单选题】
下列防伪技术,属于签发环节的是___
A. 正反对印
B. 穿孔号码
C. 防伪圆片
D. 激光全息图案
【单选题】
激光蚀刻技术通常应用在下列哪种塑封膜中___。
A. 同轴光膜
B. 热转印膜
C. 普通膜
D. 层压膜(硬卡膜)
【单选题】
防揭图文最主要的一项防伪功能是___
A. 美观
B. 易于制作
C. 图案细腻
D. 防止签证或个人资料被撕揭或更换
【单选题】
利用激光打孔成像技术在护照资料页添加持证人副照片是一项新的防伪措施,这项技术通常应用于下列哪种塑封膜上___。
A. 普通膜
B. 热转印膜
C. 同轴光膜
D. 硬卡膜
【多选题】
从出入境证件的防伪工艺看,当前各国在出入境证件中所运用的常见防伪技术主要涉及以下___几个方面。
A. 纸张防伪
B. 印刷防伪
C. 装订防伪
D. 签发防伪
【多选题】
从我们的工作角度出发,我们可以把纸张分为两大类,分别为___。
A. 普通纸张
B. 安全纸张
C. 印刷纸张
D. 生活纸张
【多选题】
对伪假水印的鉴别,可以从以下___几种光源快速地检查水印图案是否被伪造。
A. 常光
B. 侧光
C. 透射光
D. 紫外光
【多选题】
以下情况中___可以判断水印为假。
A. 常光下就能清楚地在纸张表面观察到
B. 紫外光下不可见
C. 紫外光下有明显的荧光反应
D. 透光条件下无法看清整个图案
【多选题】
以下关于安全线,描述正确的是 ___。
A. 可以是连续的,也可以是断续的
B. 可能是可见的,也可能是隐蔽的
C. 可以仅在特定的图案中露出一段
D. 可以和其他的防伪手段相结合,如荧光图案、磁性编码、缩微文字.
【多选题】
安全线可以和其他的防伪手段相结合,如___等。
A. 荧光图案
B. 磁性编码
C. 水印
D. 缩微文字
【多选题】
以下关于安全纤维,描述正确的是___
A. 镶嵌在纸张中,与纸张融为一体
B. 分布规则,且有其特定的位置
C. 大部分在紫外光下有明显的荧光反应
D. 透光条件下,可以清楚地看到缩微文字
【多选题】
在工作中,如发现以下___情况,则该证件可能系伪造护照资料页或整本伪造护照。
A. 证件中的防伪圆点或彩点系普通印刷而成
B. 防伪彩点呈晶体状明显凸起于证件表面
C. 防伪彩点附着在纸张表面可以将其从纸张上刮下来
D. 防伪彩点是添加于纸张中的,难以从纸张中剥离
【多选题】
印刷基本方法包括___
A. 平版印刷
B. 凹版印刷
C. 凸版印刷
D. 彩虹印刷
【多选题】
采用凸版印刷的号码主要有以下特征___。
A. 字符边缘有厚重的油墨“外圈”现象
B. 凸起油墨中有不规则的适明胶状或晶体状物质
C. 印刷在纸张正面上的图文低于纸张表面
D. 纸张背面通常有凸起痕迹
【多选题】
关于凹版印刷说法正确的是___。
A. 图文部分高于印版的版面
B. 凹下的版纹有深浅之分,以此表现图文的高低和油墨的厚薄
C. 印刷时油墨从滚筒表面的凹陷处转印到纸张上
D. 非印刷部分表面的油墨则被刮墨刀拭去,转印到纸张上的油墨量取决于单个凹陷处的深度
【多选题】
关于伪造的潜影图像,下列说法正确的是___
A. 通常在正面平视时就可清晰地看见隐藏的图文
B. 举过眼睛斜视时反而观察不到隐藏的图文
C. 只是采用普通印刷方式印制而成
D. 部分伪假潜影图像虽然手触时也有凹凸感,但是其与伪造凹版印刷效果所采用的方法是相同的
【多选题】
关于防复印图文,下列说法正确的是___
A. 有的以图形中相邻线条的粗细差异来防止证件被复印
B. 有的以图形中相邻线条的颜色细微差别来防止证件被复印
C. 有的以图形中线条的股数和走向变化来防止证件被复印
D. 复印时一定会出现"COPY"或"VOID"字样
【多选题】
透射紫外光下,可见以下哪些防伪点? ___
A. 水印
B. 光变油墨
C. 荧光图案
D. 安全纤维
【多选题】
对凹版印刷图文的检查方法通常采用___。
A. 侧光下观察
B. 用白纸在图文的油墨上轻轻擦拭
C. 常光下放大观察
D. 用手指轻触图文油墨
【多选题】
装订线的材质包括___
A. 棉线
B. 塑料
C. 涤纶纱线
D. 竹纤维
【多选题】
装订方式包括___
A. 中线缝合
B. 边缘缝合
C. 互锁缝合
D. 丝网缝合
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用